The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military applications. For all these applications we need a security. Encryption is one of way to give the security for data; in this regard we propose a hybrid approach for partial...
Encryption is an important technique to give data security against unauthorized access. As a new research direction of cryptography, chaotic encryption has a series of good characteristics such as sensitive to initial value, pseudo-random properties, and ergodicity and so on. However, the traditional low-dimensional chaotic system has been widely analyzed, and the chaotic sequence is truncated because...
In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand,...
The use of computer networks to transmit medical information is faced to data security problems. Hence it is necessary to make these data unreadable and indecipherable during their transfer. The encryption and decryption of medical images are performed either by software or hardware. A software implementation has the advantage of being portable and low cost but its drawback is the slowness decryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.