The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Computing devices are increasing enormously in all fields of communication, which aims to focus on secure transfer of information. In order to provide authentication, message integrity and secure message transfer, developers need to access the cryptographic packages. The objective of this paper is to analyze and compare various algorithms discussed in Bouncy Castle Toolkit. Analysis was performed...
In this paper, a generalized Fibonacci matrix and a pq-generalized Fibonacci matrix are proposed and their construction methods are obtained. As an application, an encryption/decryption algorithm based on pq-generalized Fibonacci matrix is also proposed. The algorithm permits large key amount and has verification capability.
A new encryption scheme for digital images based on compound Chaos algorithm is presented in this paper. The compound Chaos algorithm combines the Lorenz Chaotic system and Logistics map to generate the pseudo-random sequences. Then the pseudo-random sequences are used to produce the permutation matrix to encrypt the digital image. Matlab is used for simulation testing of the image encryption. Algorithm...
In the paper, an effective protection method for AutoLISP files is presented. It combines the encryption algorithm and hardware dongle. So the encryption and decryption are both fast, and difficult to decipher. It greatly improves the protection of AutoLISP files.
Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.