Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As it often happens in cryptography, a visual cryptographic method serves as primitive for more evolved file encryption algorithm. During the development and evaluation process of the pixel sieve method, several weaknesses popped out. In the attempt of solving these weaknesses a possibility to transform the method from pixel based graphical cryptographic method to a bit based file cryptographic method...
Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience. However, it is not always safe or convenient for users to type in their passwords or carrying their personal cards. In such circumstances, pressing one's fingerprint instead of typing passwords and carrying personal smart cards is much more convenient, safer and more practical...
When disturbance process of periodic signal occurs, Nonlinearity system produce bifurcation behavior which new frequency spectrum derives from every time. After infinite bifurcations , System turns into chaotic status and frequency spectrum become abundant [1]. The paper analysis the frequency spectrum of the Nonlinearity system and present application design method of chaotic Masking Encrypt technique...
Exclusive-OR (XOR) gate is one of the critical components in many applications such as cryptography. In this paper, we present an efficient multi-input XOR circuit design based on pass-transistor logic (PTL). A synthesis algorithm is developed to efficiently generate the PTL-based multi-input XOR circuits. Both pre-layout and post-layout simulation results show that our proposed multi-input XOR design...
The paper introduces the existing multi-pattern matching algorithms implemented by software, and analyses the Wu-Manber Algorithm in emphases. According to the analysis, the paper points out that we will gain different performance when we adopt different hash function or domain. This conclusion is proved by experiments, which show that we shall adopt appropriate hash functions or domain to improve...
This paper researched on KEELOQ algorithm and presented a wireless anti-theft system based on the KEELOQ technology. The system has one central controller and no more than eight monitors. When the whole wireless anti-theft system were designed, a physical testing about one hundred days was made. The results showed that the system works stably.
In order to descript how Database Technology can be used in Network Document Management System, this paper analyses the requirement of the system, and then, the paper descript the detail from these aspects: database design, security design and database optimization. Firstly, the paper shows how we can design the data storage method and the database of network document management system so that the...
In order to study the effect of chlorine (Cl2) inactivating Giardia in water, different factors as Cl2 concentration, contact time, pH, temperature, turbidity and organic content which might influence the inactivation were studied by using fluorescence staining method. With the Giardia was 1×106 cysts/mL, turbidity 1.0NTU, temperature 22°C, pH 7.0, and after 240 min reaction, under the condition that...
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers. We propose a new framework for overcoming these obstacles, and provide the...
In this paper we are proposing an efficient secure solution to the data centric routing protocol One Phase Pull diffusion which permit multi-hop routing of sensed data. SecOPP provides both Group and Pairwise key distribution with the possibility of rekeying as well as security services: integrity, authentication and confidentiality of exchanged messages. All these are obtained without using a key...
Acoustic communication has been widely used in wireless sensor networks. Vehicle acoustic signals have long been considered as unwanted traffic noise. In this research acoustic signals generated by each vehicle will be used to detect its presence and classify the type. The goal of multiscale PCA (MSPCA) is to reconstruct a simplified multivariate signal, starting from a multivariate signal and using...
With the large scale application of integrated circuit in the chaotic encryption, the design of cryptogram program based on the chaotic system becomes a new trend of cryptography. The digital degradation after the chaotic digitization is a key issue to be resolved, while current study pays more attention to digital chaotic period behavior, but the other characteristics of digital chaotic also plays...
A novel permutation-substitution scheme, which is based on chaotic standard map, for the image encryption is proposed. It is loss-less symmetric block cipher and specifically designed for the colour images. The initial condition & system parameter of the chaotic standard map, number of iterations and number of rounds constitute the secret key of the algorithm. Firstly we mix all three colour layers...
Single chaotic system which is realized with limited precisions in digital computers can lead to dynamical degradation of the original systems. To solve the dynamical degradation problem, this paper introduces a new kind of dual chaotic encryption algorithm which is constructed via a Logistic map and a Sine iterative map. Digital PR sequence is generated using the dual chaotic system, and then an...
Strong cryptographic security, short encryption time, and robustness against noise are three goals of cryptosystem. However, most existing chaotic cryptosystems only focus on the research of enhancing cryptographic security and shortening encryption time. To overcome drawbacks and weaknesses of the existing algorithms, the paper analyzes the pseudo-chaotic characteristics of irrational numbers and...
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
This work is a new proposal of neural synchronization, which is a communication of two Tree Parity Machines (TPMs) for agreement on a common secret key over a public channel. This can be achieved by two TPMs, which are trained on their mutual output, which can synchronize to a time dependent state of identical synaptic weight vectors. In the proposed TPMs random inputs are replaced with queries, which...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.