Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Interval multicast was defined as to send a message to a subset of a group, rather than all of the members in the group, which is important in battle fields and other applications. A key-tree based approach was proposed to achieve interval-multicast security, i.e., to securely multicast the message to the subgroup. The cost of the proposed approach is defined as the number of different keys needed...
Applications performing scientific computations or processing streaming media benefit from parallel I/O significantly, as they operate on large data sets that require large I/O. MPI-I/O is a commonly used library interface in parallel applications to perform I/O efficiently. Optimizations like collective-I/O embedded in MPI-I/O allow multiple processes executing in parallel to perform I/O by merging...
Signcryption is a public key cryptographic primitive that combines the functionalities of encryption and digital signatures in a single logical step at low computational and communications costs. This paper presents a new efficient multi-recipient identity-based signcryption scheme. The scheme provides public verifiability of ciphertext origin which is an essential requirement in firewall authentication...
In this paper, we propose an improved RC6 encryption algorithm that have the same structure of encryption and decryption. So far, conventional RC6 algorithms have difference structure of encryption and decryption. We devise our algorithm by inserting a symmetric layer using simple rotation and XOR operations, in which the half of whole RC6 rounds uses encryption procedure and the rest of it are employs...
In this paper proposed a new secret-key block cipher method, in the proposed method, the plaintext and the ciphertext are 33152 bit blocks or multiple of 33152. The ciphertext are 33152 bit blocks or multiple of 33152. The secret key is dynamic key with 33152 bit long or multiple of 33152. The proposed method is combine of RSA, DES, TowFish, Caesar and Reversed ciphers.
The digital content services in home network provide a various kind of services such as cultural life and offer convenience, accessibility and effectiveness to users. But, digital contents are easy to be duplicated illegally and used fraudulent by malicious party which break down the development of digital content services in smart home environment. To protect digital contents from those problems,...
Content distribution systems benefit from network coding in terms of error/loss protection and faster dissemination at the cost of exposing the data to intermediate nodes that are not the intended recipients. In these systems data secrecy is at risk and it can be guaranteed by using encryption as a straightforward method. However, this inevitably increases the communication costs and decreases the...
This study centers on multiple-scheme encryption using annotation technology. The objective was to propose a composite encryption framework that combines several encryption specifications. It was assumed that combining several encryption standards can further enhance information security. It divided a message to be encrypted into packets and each packet was coded with a methodology independent of...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
This paper is aimed at the image encryption scheme applicable to JPEG2000 codec. Firstly, two chaotic maps are suggested and their statistic characteristics are also analyzed. Secondly, to accomplish a controllable visual effect of encrypted image, a visual quality control model is presented, and on the basis of which, a chaotic image encryption scheme is constructed by chaotically modulating the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.