• No results found

[PDF] Top 20 Cryptography with One-Way Communication

Has 10000 "Cryptography with One-Way Communication" found on our website. Below are the top 20 most common "Cryptography with One-Way Communication".

Cryptography  with  One-Way  Communication

Cryptography with One-Way Communication

... generally one combination from a list of possible choices) is flipped then the receiver outputs m while on the other hand flipping of another combination makes the receiver output 1 − ...exactly one bit but ... See full document

37

An Improved Cryptography Scheme for Secure Image Communication

An Improved Cryptography Scheme for Secure Image Communication

... Traditional encryption algorithm such as DES, IDES, and IDEA are against the plain text and are not suitable for digital image encryption [2]. In order to safely transmit images, numerous encryption algorithms have been ... See full document

5

Analysis of Group Key Management Scheme using One-way Function Tree

Analysis of Group Key Management Scheme using One-way Function Tree

... Many real time network applications like teleconferences, online gaming, video-on-demand, Pay-per-view video streaming are based on group communications. These applications can be implemented by using secure multicast in ... See full document

6

A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography

A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography

... In this paper, the use of hardware platform for building a real-life application has proved to be satisfactory and promis- ing in terms of speed, versatility and security. As one of the most common ... See full document

5

On  the  Existence  of  Extractable  One-Way  Functions

On the Existence of Extractable One-Way Functions

... Obfuscation. Program obfuscation is aimed at making code unintelligible while preserving its functionality, and has been long considered to be a holy grail of cryptography, with diverse and far reaching ... See full document

42

Multi -Way Encryption Using Elliptic Curve Cryptography

Multi -Way Encryption Using Elliptic Curve Cryptography

... The crucial property of an elliptic curve is that resultant point of two points after addition is a point on the elliptic curve. In mathematics, the point and the addition laws from a finite abelian group. We need to ... See full document

6

Design of a Secure File transfer System Using Hybrid Encryption Techniques

Design of a Secure File transfer System Using Hybrid Encryption Techniques

... and communication network promoted many users to transfer files and sensitive information through the network, this sensitive data requires special ...the communication networks, based on the use of ... See full document

6

Science and Study of Secret Writing- Cryptography

Science and Study of Secret Writing- Cryptography

... online communication. Effectiveness of the Cryptography: A Security ...Measure”. Cryptography defined as "the science and study of secret ...by cryptography is the ability to send ... See full document

7

One Way Direction Communication Synchronization for WideMac Protocol in IR-UWB based WSN

One Way Direction Communication Synchronization for WideMac Protocol in IR-UWB based WSN

... To overcome this problem, a synchronization (timing) mechanism has been implemented. Figure 9 clearly shows that this problem has been overcome by this synchronization mechanism since in the same simulation scenario (24 ... See full document

7

A Review on Public Key Cryptography: Algorithms

A Review on Public Key Cryptography: Algorithms

... essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal ...passwords. One essential aspect ... See full document

7

Theoretical Re-Study on One-Way Barcode Communication Between Networks and Its Application Prospects

Theoretical Re-Study on One-Way Barcode Communication Between Networks and Its Application Prospects

... from one party to any other party, accurately and safely ...from one point to another through a certain ...words, communication is the transmission or exchange of information in some way ... See full document

7

Marginalisation, Communication and Media Life: An Explorative Study of
Santal Community in India

Marginalisation, Communication and Media Life: An Explorative Study of Santal Community in India

... They remain excluded from mainstream society in terms of culturally, socially and even unequal access of opportunities of developmental means. However, regional inequalities and gender inequality denotes to a level of ... See full document

6

The Quantum Cryptography for Efficient Communication in Wireless Network

The Quantum Cryptography for Efficient Communication in Wireless Network

... classical communication where many photons carry the same ...optical communication is already down to a few tens of photons, although in practice one usually uses many ... See full document

6

Key Management With Cryptography

Key Management With Cryptography

... or one- key algorithms, require that the sender and receiver agree on akey before they can communicate securely The security of a symmetric algorithm rests in the key,divulging the key means that anyone could ... See full document

6

Post-9/11 U.S. Public Diplomacy in Eastern Europe: Dialogue via New Technologies or Face-to-Face Communication?

Post-9/11 U.S. Public Diplomacy in Eastern Europe: Dialogue via New Technologies or Face-to-Face Communication?

... of communication, often viewed as “an extended lecture” held by an “overly busy professor lecturing the world with little time for class discussion or questions” was seen as the result of a “lack of ability to ... See full document

19

The One-Way Communication Complexity of Hamming Distance

The One-Way Communication Complexity of Hamming Distance

... randomized communication protocol that solves every instance of indexing with probability of error at most δ , then for any distribution µ on the inputs for indexing, there is a deterministic protocol that works ... See full document

7

Limitations of Quantum Advice and One-Way Communication

Limitations of Quantum Advice and One-Way Communication

... that one could hope for, since the only classes known to lie between BQP and PP and not known to equal either are obscure ones such as AWPP ...PP; one can think of it as a quantum analogue of the classical ... See full document

28

Design and Implementation of Intelligent Energy Distribution Management System

Design and Implementation of Intelligent Energy Distribution Management System

... two-way communication infrastructure to modify the service provider andcustomers to exchange info with one ...there communication system, the service supplier will charge customers with ... See full document

6

The Impact of Communication in Teaching: A Two way Communication Approach

The Impact of Communication in Teaching: A Two way Communication Approach

... Responses of both 4 th and 2 nd year students showed that applying these codes of ethics was as a two-way contract, mutually respected and applied. As 2 nd year-students were the first year in specialization, they ... See full document

19

Chapter 18: System Security

Chapter 18: System Security

...  Asymmetric cryptography used to establish a secure session key (symmetric encryption) for bulk of communication during session.  Communication between each computer theb uses symmetri[r] ... See full document

43

Show all 10000 documents...