The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
Digital signature confirmation conspire gives secure correspondence between two clients. A legitimate advanced mark gives a beneficiary motivation to trust that the message was made by a known sender, with the end goal that the sender can't deny having sent the message (confirmation and non-renouncement) and that the message was not adjusted in travel (integrity). The center of this paper is to talk...
Digital signature authentication scheme provides secure communication between two users. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). The focus Synopsis of this paper is to discuss...
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of texts in English and/or Bulgarian using the RSA algorithm. The processes of encryption and decryption are illustrated. The material is used in the educational process in the course “Telecommunication Security” but it can be applied in other disciplines involving issues of cryptographic information...
Calculation of large numbers is the foundation technique to the procedure of computer encryption and decryption. Unfortunately, the operation capacity of our today's computers cannot satisfy our needs. In another word, computer software today cannot perform the calculation of large number that incorporates hundreds or thousands of digits to accuracy. In particular, division of large numbers is the...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique...
This article studies copyright protection system, and generalize system framework, Firstly, it introduces the technological base of digital copyright protection systems, outlined several digital content encrypting algorithms and one-way hash function; Secondly, it introduces system design, security requirements and working principle. Finally, it introduces digital copyright protection system framework,...
Conventional approach of detecting malwares relies on static scanning of malware signature. However, it may not work on the malwares that use software protection methods such as encryption and packing with run-time decryption and unpacking. We propose a hardware-assisted malware detection system that detects malwares during program run time to complement the conventional approach. It searches for...
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID- based threshold signature scheme, which has three attractive properties: (1) The user's co-signing key and signature share are all verifiable,...
Data aggregation is one of the most important techniques in wireless sensor networks to save energy through reducing lots of transmission. However, plaintext aggregation is insecure since eavesdropping or modifying messages is possible. Due to this, concealed data aggregation schemes based on homomorphic encryption have been proposed. Ciphertexts can be operated algebraic computations without decryption...
In this paper, we propose a simple and highly secure signature scheme to protect the copyright of digital-signal. Employing the masking property of human ears that most of people can't hear the signal of frequency of 1-20Hz, we use the encoding scheme to change the energy of frequency to conceal a signature. The embedded signature values will not influence the quality of original audio-signal. We...
Tsujii et al. (see ibid., vol.23, no.11, p.558-60, 1987) proposed a public key cryptosystem which requires only O(m/sup 2/) bit operations for encryption/decryption and which also realised digital signatures; m here is the block length. The speed advantage over better known systems such as the RSA system (which takes O(m/sup 3/) operations) could have been immensely significant. Unfortunately it is...
The letter proposes a new public-key cryptosystem which requires O(m2) operations for encryption/decryption (m is the message bit length) and also realises digital signatures. Two possible attacking methods to break the proposed cryptosystem are considered, and consequently the cryptosystem seems to be highly reliable.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.