The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Constructions of secure channel encoders, based on secret pruning, are considered in this paper. The key defines how pruning is applied on a mother convolutional code. This results in a secret subspace that legitimate users are using to perform decoding, in contrast to an eavesdropper that employs the mother code. Both reliability and security aspects of the joint scheme are treated. We derive the...
In this paper we propose using the compression method, Shannon-Fano-Elias coding, for encryption. Shannon-Fano-Elias codes lend themselves for encryption because code-words depend on the order in which the symbols that need to be coded are written and it does not matter if the probability mass function of the symbols is known to everyone. If there are n symbols then there are n! orderings, each leading...
We consider a secure verification problem in which Alice wants to verify whether her signal Xn is compatible with Bob's signal Yn, where Xn and Yn are drawn i.i.d. according to a joint distribution p(x, y). The notion of compatibility is defined as the requirement that p(x, y) belongs to a certain set A of allowable joint distributions. For privacy, Alice jointly encrypts and encodes Xn and transmits...
Typogenetic algorithms are a break from classical approaches to computation. Based on gene expression and intercellular processes, typo-genetic computation can offer a new approach to the algorithmic problems of system security, data compression and encryption. The method has a potential of much higher compression ratios at the limited computational costs i.e. processing time. This paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.