• No results found

[PDF] Top 20 Cryptography and its application to operating system security

Has 10000 "Cryptography and its application to operating system security" found on our website. Below are the top 20 most common "Cryptography and its application to operating system security".

Cryptography and its application to operating system security

Cryptography and its application to operating system security

... encryption (Katzan, 1977) (Diffie & Hellman, 1979). In contrast to substitution, transposition techniques actu[r] ... See full document

145

Protected Secret Sharing and its Application to Threshold Cryptography

Protected Secret Sharing and its Application to Threshold Cryptography

... Threshold cryptography is the art of chopping a secret into little bits, so that the secret can only be learned by possessing more than a threshold number of those ...threshold cryptography is described as ... See full document

50

Group Structure of Special Parabola and Its Application in Cryptography

Group Structure of Special Parabola and Its Application in Cryptography

... and Its Application in ...key cryptography is one of the most important research contents in modern ...The security of its public key cryptosystem is based on the difficulty of solving ... See full document

7

Multi-Instance  Security   and  its  Application  to  Password-Based  Cryptography

Multi-Instance Security and its Application to Password-Based Cryptography

... multi-instance security with a foundational treatment in two ...password-based cryptography, providing a modular framework that proves mi-security of password-based primitives by viewing them as ... See full document

30

A Three Way Visual Cryptography & its Application in biometric Security : A Review

A Three Way Visual Cryptography & its Application in biometric Security : A Review

... Keywords—Visual Cryptography, Encryption, Decryption, Shares, Extended Visual Cryptography ...Image security becomes a very important issue for image transmission over the internet or wireless ... See full document

11

Web Security based on the Application of Cryptography

Web Security based on the Application of Cryptography

... ‘Quantum Cryptography’ is used. The major attribute of quantum cryptography is its ability to exchange the encryption key with absolute ...of cryptography dates back to the times of Julius ... See full document

5

On the Application of Identity-Based Cryptography in Grid Security

On the Application of Identity-Based Cryptography in Grid Security

... grid security archi- tecture has been carried out either by grid or IBC research ...the application of IBC in grid security at the architec- tural level is still an ongoing research ...identity-based ... See full document

190

A Discussion on Elliptic Curve Cryptography and its Application

A Discussion on Elliptic Curve Cryptography and its Application

... the security of ECC since its ...RSA Security has researched on efficient ECC algorithms, and even acquired a patent on a storage- efficient basis conversion ...of its products, acknowledging ... See full document

6

Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography

Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography

... ( ) t n , SS, participating users in a threshold crypto- graphic application can be either legitimate group mem- bers or attackers. All threshold cryptographic applica- tions only consider the situation when all ... See full document

8

Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography

Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography

... Thus, cryptography has become a part of daily life as a branch of computer science that provides security over ...information security more than ever [1, ...of cryptography in the information ... See full document

43

Operating System Security

Operating System Security

... system’s security goals goes far beyond verifying the authorization mechanisms are implemented ...correctly.The system implementation must be verified to ensure that all system resource mechanisms ... See full document

236

Cryptography Based Security for Cloud Computing System

Cryptography Based Security for Cloud Computing System

... Amazon S3 stores objects redundantly across multiple facility in an Amazon S3 region. This redundancy helps is repairing data if there is a data corruption issue. In addition Amazon S3 also uses versioning to preserve ... See full document

5

Linux Operating System Security

Linux Operating System Security

... network security issues and how to control network ...of cryptography can improve system security, including topics such as VPNs, SSL/TLS, and ... See full document

9

Role of Cryptography & its Related Techniques in Cloud Computing Security

Role of Cryptography & its Related Techniques in Cloud Computing Security

... and its security issues block the prevalence ...it. Security is the most important concern in cloud computing including the data protection, network security, virtualization security, ... See full document

12

Security Enhancement System Based on the Integration of Cryptography and Steganography

Security Enhancement System Based on the Integration of Cryptography and Steganography

... a security enhancement system for image and text which are widely used over electronic ...the security requirements such as confidentiality of hidden ...proposed system can be applied in many ... See full document

14

Android Operating System Security Issues

Android Operating System Security Issues

... The newer variants of GinMaster were able to avoid detection by most anti-virus software in order to get into devices. Using polymorphic tecchniques, the program would obfuscate class names for infected objects and ... See full document

5

CYBER SECURITY & CRYPTOGRAPHY

CYBER SECURITY & CRYPTOGRAPHY

... in cryptography and to introduce the students to various cryptographic algorithms and techniques used for implementing data security and ...web application security ... See full document

7

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY

... higher-level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication ...sends its certificate and ... See full document

8

Android Operating System and its Security Issues

Android Operating System and its Security Issues

... Tablet Operating System premised on the Linux kernel owned by ...Android Operating System is open source due to this anyone can publish their applications freely on the Android ...to ... See full document

9

Application Security Support in the Operating System Kernel

Application Security Support in the Operating System Kernel

... as application actions can implicitly cause permissions to be acquired (and ...authorization system in two ways (1) when they request any operation and (2) when they try to change the authoriza- tion ... See full document

11

Show all 10000 documents...