• No results found

secure channel

Analysis of Secure Channel Establishment Techniques for Transmission of Watermarked Image

Analysis of Secure Channel Establishment Techniques for Transmission of Watermarked Image

... Slave wishes to exchange data, both agree on a symmetric key. For encryption or decryption of the messages symmetric key is used. We knows that Diffie Hellman algorithm is used for only key agreement or key exchange, but ...

9

Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud Computing

Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud Computing

... Cloud computing is the environment which provides on- demand & convenient access of the network to a computing resources like storage, servers, applications, networks and the other services which can be released ...

5

Congestion Control Using Secure Channel in MANET
                 

Congestion Control Using Secure Channel in MANET  

... a secure channel protocol proposed by Canetti and Krawczyk [14] if and only if the underlying authenticated encryption mechanism meets two novel, easy definitions of security that we initiate, and the ...

6

Implementing Secure Channel for Data Transmission

Implementing Secure Channel for Data Transmission

... In any modern network, there is a need for security. However, the current internet environment without integrating with security mechanisms has a number of security problems and lacks effective protection and integrity ...

7

BSN To Secure Channel On Cloud

BSN To Secure Channel On Cloud

... information and still quickly react to users’ serious things and save their lives by dispatching automotive vehicle and medical personnel to an emergency location in a passing timely fashion. Opportunist computing, as a ...

6

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

... With the development of the Internet, secure data transmission become more and more important. There are different works that guarantee information security and increase performance efficiency. Fausto Meneses [9] ...

10

Client Server Communication In Android OS Using Dynamic Key Security Algorithm

Client Server Communication In Android OS Using Dynamic Key Security Algorithm

... a secure channel. A secure channel is a way of transferring data that is resistant to overhearing and ...a secure channel to transmit the data for the android application by ...

6

Anticipated security model for session transfer and services using OTP

Anticipated security model for session transfer and services using OTP

... a secure channel to exchange information by reducing the risk and ...most secure systems are not immune from risk and much effort is needed to improve internet ...

8

Secure Communication Based Sound Transfer for Smart Phone

Secure Communication Based Sound Transfer for Smart Phone

... We create an android application here to acquire the emitted data of a particular shop. The last step is necessary since the similarity between fingerprints is typically not sufficient to establish a secure ...

5

Augmented  Secure  Channels   and  the  Goal  of  the  TLS 1.3  Record  Layer

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer

... basic channel abstraction, an augmented secure channel (ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity- ...of ...

20

Online Full Text

Online Full Text

... Abstract— Cloud computing can be seen as a classical model that offers computing in a dimension that benefits both the providers and the consumers. The cloud providers have their infrastructure spread within or across ...

6

Transmission over Cognitive Radio Channel with Novel Secure LT Code

Transmission over Cognitive Radio Channel with Novel Secure LT Code

... link channel model is proposed and a combina- tional block is proposed for a secure LT code, as well as providing security and error correction capability simul- ...a secure channel, as a ...

6

Key Management Approach for Secure Mobile Open IPTV Service

Key Management Approach for Secure Mobile Open IPTV Service

... and secure channel group key establishment and rekeying management scheme for mobile open IPTV ...the secure group key rekeying in addition to decreasing the storage and communication ...

22

Image Hiding Steganography with Digital Signature Framework

Image Hiding Steganography with Digital Signature Framework

... the secure transmission data over insecure channel by concealing the initial information into another cover media, Where as text information concealing is kind of a development in computer security ...

6

Secure  modular  password  authentication  for  the  web  using  channel  bindings

Secure modular password authentication for the web using channel bindings

... Personalization against UI spoofing As mentioned previously a trusted path and branding is not enough to tackle more sophisticated UI spoofing attacks. A malicious website may for example rebuild the user interface of ...

34

A  One-time  Stegosystem   and  Applications  to  Efficient  Covert  Communication

A One-time Stegosystem and Applications to Efficient Covert Communication

... the channel is a stationary distribution produced by a sequence of independent repetitions of the same ...provably secure stegosystem that pairs rejection sampling with a pseudorandom function family to ...

17

Performance Enhancement of RSA Algorithm Using Artificial Neural Networks

Performance Enhancement of RSA Algorithm Using Artificial Neural Networks

... Cryptography refers to the tools and techniques used to make messages secure for communication between the participants and make messages immune to attacks by hackers. A cryptosystem is simply an algorithm which ...

7

Defense against Cache Based Side Channel Attacks for secure cloud 
		computing

Defense against Cache Based Side Channel Attacks for secure cloud computing

... a secure space in cache to the data of that security critical ...cloud secure to a certain level as still attacker can analyze the timer for that particular program execution or the power ...

7

Highly secure cryptographic computations against side-channel attacks

Highly secure cryptographic computations against side-channel attacks

... It is well known that the feature of making a distinction between encryption and decryption key for public key cryptography can facilitate many unique cryptographic/secure services such like digital signature and ...

99

An Intelligent and Secure Package Sensoring Logistics System Based on a Subliminal Channel

An Intelligent and Secure Package Sensoring Logistics System Based on a Subliminal Channel

... (6) Package: Merchandise sent by the store to the client;the tag and sensor are attached outside the. 202[r] ...

27

Show all 10000 documents...

Related subjects