• No results found

public key based system

Electronic Document Secure Management System Based on Content Analysis for Enterprise

Electronic Document Secure Management System Based on Content Analysis for Enterprise

... management system [2] was to create platform independent Web application to manage and distribute electronic docs just using Web browser, which provided an extra tool, that can speed up doc flow in any ...the ...

7

E-Tendering With Public Key Infrastructure – A Survey Based Implementation

E-Tendering With Public Key Infrastructure – A Survey Based Implementation

... private key of the digital certificate will be accessed and the respective certificates will be mapped with the ...Thumbprint, public key, certificate valid from, certificate valid to, etc details ...

6

Survey Report on Chaos Based Public-key Cryptosystem

Survey Report on Chaos Based Public-key Cryptosystem

... Is a dynamical system that models the behavior of non- linear systems (especially partial differential equations). They are predominantly used to qualitatively study the chaotic dynamics of spatially extended ...

7

A  new  public  key  system  based  on  Polynomials  over  finite  fields  GF(2)

A new public key system based on Polynomials over finite fields GF(2)

... presented system has all features of ordinary public key schemes such as public key encryption and digital ...presented system are also introduced along with comparison with ...

5

Identity-based key encapsulation with semantically secure Searchable Public-Key encryption

Identity-based key encapsulation with semantically secure Searchable Public-Key encryption

... encryption system is the deterministic if encryption algorithm is ...and Public sectors such different industries in different sectors are work together on multiple natureof cloud ...

11

Pseudo Random Generator Based Public Key Cryptography

Pseudo Random Generator Based Public Key Cryptography

... proposed system is tested for BER at different SNR values using MATLAB software version ...secret key is used to generate the p-n sequence which is further used to select the G-matrix, it is impossible for ...

5

PUBLIC KEY CRYPTOGRAPHY WITH SYSTEM OF NON-HOMOGENEOUS EQUATIONS

PUBLIC KEY CRYPTOGRAPHY WITH SYSTEM OF NON-HOMOGENEOUS EQUATIONS

... Public Key Cryptography with system of non-homogeneous linear equations is a two-stage secured ...a system of non-homogeneous linear equations and using this system, we describe ...

8

Secure Public-Key Based Effective and Efficient Sensor Networks

Secure Public-Key Based Effective and Efficient Sensor Networks

... security system to protect the networks from the man-in-middle ...attacks based on hidden generator point over elliptic curve cryptography for public ...

6

A  SAT-based  Public  Key  Cryptography  Scheme

A SAT-based Public Key Cryptography Scheme

... cryptography based on NP-hard prob- lems is dubbed ...crypto-system based on the Boolean Satisfiability Problem ...secret key rather than a trap ...

11

Key Management With Cryptography

Key Management With Cryptography

... certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored ...the public key cryptography and identity-based(ID- ...

6

Direct  Chosen-Ciphertext  Secure  Attribute-Based  Key  Encapsulations  without  Random  Oracles

Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles

... a system is usually not meant for a single user but for a sub- group of ...secret key and data should be encrypted only ...of public-key encryption (PKE) ...

19

An Authentication of Secretely Encrypted Message 
          Using Half-Tone Pixel Swapping From Carrier
          Stego Image

An Authentication of Secretely Encrypted Message Using Half-Tone Pixel Swapping From Carrier Stego Image

... Tung-Hsiang Liu and Long-Wen Chang [7] Proposed data hiding technique for binary images in 2004. The proposed method embeds secure data at the edge portion of host binary image. We find the best changeable pixels in a ...

6

Key  distribution  system   and  attribute-based  encryption

Key distribution system and attribute-based encryption

... new key distribution system and attribute-based encryption system over non- commutative ring where the complexity required for enciphering and deciphering is ...is based on the ...

9

A distributed public key creation system for ad-hoc groups

A distributed public key creation system for ad-hoc groups

... distributed public-key creation system for ad-hoc groups based on a traditional RSA ...The system presented was able to create these secure groups with a 1024-bit RSA modulus within an ...

42

Design an Advanced Encryption Standard (Aes) Algorithm

Design an Advanced Encryption Standard (Aes) Algorithm

... efficient public key encryption system which is based on Rijndael Algorithm that can be used to create faster and efficient cryptographic ...is based on optimizing area in terms of ...

5

Public Key Cryptology – An Art of Keeping Secrecy and Authenticity

Public Key Cryptology – An Art of Keeping Secrecy and Authenticity

... secure system that is required to manage and control ...correct public key of the receiver which is not a manipulated key by the ...since public key of the receiver has to be ...

6

Dual-layer Video Encryption & Decryption using RSA Algorithm

Dual-layer Video Encryption & Decryption using RSA Algorithm

... known public key cryptosystems for key exchange or digital signatures or encryption of blocks of ...size key. It is an asymmetric (public key) cryptosystem based on number ...

8

Analysis of homomorphic crypto systems

Analysis of homomorphic crypto systems

... crypto system is the first probabilistic public encryption system which is probably secure ...crypto system is based on quadratic residuosity ...probabilistic key generation and ...

7

An Efficient Scheme for Message Encryption based on Public Key Crypto System

An Efficient Scheme for Message Encryption based on Public Key Crypto System

... Unlike RSA, NTRU [7] is not widely used, and in fact, the NTRU cryptosystem needed changes early on to improve its security by addressing weaknesses and performance. However, today NTRU is recognized as faster than the ...

6

A  Public  Key  Exchange  Cryptosystem  Based  on  Ideal  Secrecy

A Public Key Exchange Cryptosystem Based on Ideal Secrecy

... A key exchange scheme over a public channel is proposed using the polar code matrix and also its extension over matrices over finite ...large system of quadratic ...secrecy based public ...

21

Show all 10000 documents...

Related subjects