• No results found

encryption technology

The Research of Communication Encryption Technology in Power Information System

The Research of Communication Encryption Technology in Power Information System

... communication encryption technology to protect the remote access process of the system; the SCADA (supervisory control and data acquisition) system uses communication encryption technology to ...

5

Research and Application of Transparent File Encryption Technology on Android Platform

Research and Application of Transparent File Encryption Technology on Android Platform

... transparent encryption system based on file filter driver is designed and implemented, according to the technology of file transparent encryption and decryption system based on hook transparent ...

9

Title: Enhancement of Wireless Network Security by Customized Encryption Technology & using Multilayer of Security

Title: Enhancement of Wireless Network Security by Customized Encryption Technology & using Multilayer of Security

... radio technology is same as digital cellular & a low-frequency radio ...spectrum technology to enable communication among many devices within a limited ...

7

LIBRARY SOLUTIONS USING QR CODE ENCRYPTION TECHNOLOGY

LIBRARY SOLUTIONS USING QR CODE ENCRYPTION TECHNOLOGY

... of technology, education and anything related to it has been shifted to computerized through an ...qrcode encryption technology is to keep the book in the proper way with its complete details ...

5

Implementation of Dedicated Hardware Using Encryption Technology

Implementation of Dedicated Hardware Using Encryption Technology

... The introduced system in supports the AES encryption-decryption scheme with rolling architecture. The focus of was to implement a pipelined architecture for AES encryption. presents a pipelined architecture ...

6

 Counterfeit Drugs: Problems And Solutions

 Counterfeit Drugs: Problems And Solutions

... mass encryption enjoys over all other currently available technologies is that it empowers the consumer to authenticate a ...mass encryption technology, to enter into India highlights both the ...

6

Application research of digital media image processing technology based on wavelet transform

Application research of digital media image processing technology based on wavelet transform

... Image encryption is another important application area of digital image processing technology, mainly including two aspects: digital watermarking and image ...watermarking technology directly embeds ...

10

Research on digital image encryption algorithm based on double logistic chaotic map

Research on digital image encryption algorithm based on double logistic chaotic map

... the encryption results, the encryption algo- rithm or the cryptographic system has a better encryption effect, that is, the high sensitivity to the existence of the ...an encryption system ...

10

A Modified Location-Dependent Image Encryption for Mobile Information System

A Modified Location-Dependent Image Encryption for Mobile Information System

... through encryption of data. A lot of encryption techniques have evolved over ...data encryption techniques are ...The encryption technology cannot restrict the location of data ...

6

Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China

Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China

... what technology is not perfect, there is or will be some ...advance. Encryption technology can’t stop illegal distribution once it’s been released or the movie is ...

18

The study of chaos encryption algorithm for wireless sensor networks based on the reconfigure technology of FPGA

The study of chaos encryption algorithm for wireless sensor networks based on the reconfigure technology of FPGA

... The factors restricting the development of wireless sensor networks (WSNs) included its cost, power consumption and safety. The Field Programmable Gate Array (FPGA) had many advantages with high processing speed, high ...

6

MODERN NETWORK SECURITY: ISSUES AND CHALLENGES

MODERN NETWORK SECURITY: ISSUES AND CHALLENGES

... security technology and their practical applications like Advance Encryption Standard (AES), CMAC mode for authentication and the CCM mode for authenticated encryption standards are also discussed in ...

7

The PolyVernam Cipher

The PolyVernam Cipher

... of encryption and decryption of data is mostly dependent on the speed of calculation of a hash code, ...the encryption and the decryption process and is, therefore, ideal in situation where the speed is of ...

10

An Improved Authentication System Using Finger Vein Imaging

An Improved Authentication System Using Finger Vein Imaging

... biometric technology has its merits and shortcoming, it is difficult to make a comparison ...biometric technology was first proposed in 1992, while researches only paid attentions to vein authentication in ...

12

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion

... In [4] a new steganography method is proposed which is again a combination of encryption/ decryption algorithm and steganography algorithm. This paper presents a technique for Image steganography based on LSB ...

8

Implementation of a Wireless Communication System   A Review

Implementation of a Wireless Communication System A Review

... Handel-C [9] programming language is used for hardware compilation and implementation of various algorithms. Fig.4 shows the Bluetooth communication between two RC10 FPGA prototyping boards. Here author [Ref.8] has ...

6

Functional  Encryption  for  Regular  Languages

Functional Encryption for Regular Languages

... Designing an encryption system to support a DFA-type functionality provides a new set of challenges. It is useful to compare them to those in building a boolean formula (ABE) type system. In existing ABE systems a ...

18

Audit Free Cloud Storage via Deniable Attribute based Encryption
G Prashanth, L Nithish Reddy & Mrs V Ambica

Audit Free Cloud Storage via Deniable Attribute based Encryption G Prashanth, L Nithish Reddy & Mrs V Ambica

... deniable encryption schemes, we build two encryption en- vironments at the same time, much like the idea proposed in ...an encryption scheme from composite order groups to prime order groups for ...

10

International Journal of Scientific Research and Reviews A Review on Cryptography In Information Security

International Journal of Scientific Research and Reviews A Review on Cryptography In Information Security

... The essential requirements for security incorporate confidentiality, validation, integrity and non-renouncement to represent such security administrations, most frameworks uses two noteworthy categories of cryptographic ...

10

Audio Encryption with AES and Blowfish

Audio Encryption with AES and Blowfish

... The security of Blowfish Algorithm is analyzed in [20]. Cryptographic tests like randomness test, avalanche criteria and correlation coefficient must be conducted to test the algorithm. Non-Random block cipher is ...

11

Show all 10000 documents...

Related subjects