Results 11 - 20
of
58,038
Analysis and Comparison of Cryptographic Techniques in E-voting and
, 2005
"... Abstract: Recently, many cryptographic techniques have been used for secure e-voting sys-tems and e-auction systems. In this paper, we compare the used cryptographic techniques of e-voting systems with those of e-auction systems. We analyze advantages and disadvantages of various cryptographic techn ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract: Recently, many cryptographic techniques have been used for secure e-voting sys-tems and e-auction systems. In this paper, we compare the used cryptographic techniques of e-voting systems with those of e-auction systems. We analyze advantages and disadvantages of various cryptographic
A Confidential Passive UHF Reader with Cryptographic Technique
"... Abstract. In this paper, a passive UHF reader design with cryptographic technique SM2 is presented. By designing board compatibility of security module, RFID control module, RF module, communications interface, the passive UHF reader can both operate at common mode and security mode. This design con ..."
Abstract
- Add to MetaCart
Abstract. In this paper, a passive UHF reader design with cryptographic technique SM2 is presented. By designing board compatibility of security module, RFID control module, RF module, communications interface, the passive UHF reader can both operate at common mode and security mode. This design
CRYPTOGRAPHIC TECHNIQUES- ESSENTIAL APPLICATIONS IN NETWORK ADMINISTRATION
"... Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, ..."
Abstract
- Add to MetaCart
, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area
Advanced Cryptographic Techniques for Secured Cloud Computing
"... The past decade of computing has witnessed a number of new computational models and the most prominent among them is Cloud Computing. Cloud Computing is a paradigm shift that helps a user with internet based computing services that can be accessed from anywhere on any platform. But despite of its ad ..."
Abstract
- Add to MetaCart
remains to be undercover. This paper discusses about the two most promising cryptographic techniques, that are, if implemented correctly can effectively mitigate the security threats and can help in an increased uses of cloud computing.
Implementation of Clipboard Security using Cryptographic Techniques
"... In the present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between a ..."
Abstract
- Add to MetaCart
. In our approach we prevent the clipboard data by encrypting the content at the time of copying & cutting and decrypting at the time of pasting, for this we use cryptographic techniques.
A calculus for cryptographic protocols: The spi calculus
- Information and Computation
, 1999
"... We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the ..."
Abstract
-
Cited by 919 (55 self)
- Add to MetaCart
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols
Security and Composition of Multi-party Cryptographic Protocols
- JOURNAL OF CRYPTOLOGY
, 1998
"... We present general definitions of security for multi-party cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation. The definiti ..."
Abstract
-
Cited by 465 (19 self)
- Add to MetaCart
We present general definitions of security for multi-party cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation
A Visual Cryptographic Technique to Secure Image Shares
"... The Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by breaking it into shares. A distinctive property of VCS is that one can visually decode the secret image by superimposing shares without computation. The project presents an approach for embedding visual cryptogra ..."
Abstract
- Add to MetaCart
cryptographically generated image shares in the host images to provide authentication for the VC shares and makes these secret shares invisible by embedding them into host images. The secret shares generated from VC encryption are watermarked into some host images using digital watermarking. Digital watermarking
Cyclic Cryptographic Technique Using Substitution and Genetic Function
"... Abstract- The paper introduces a new algorithm for encryption and decryption. The process of substitution and genetic function is the core of the algorithm. With the use of the below mentioned method encryption or decryption of a message would be done in a new way. All are shown in Figure I ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract- The paper introduces a new algorithm for encryption and decryption. The process of substitution and genetic function is the core of the algorithm. With the use of the below mentioned method encryption or decryption of a message would be done in a new way. All are shown in Figure I
Safe enclosures: towards cryptographic techniques for server protection
"... Abstract. Cryptography is generally used to protect sensitive data from an untrusted server. In this paper, we investigate the converse question: can we use cryptography to protect a trusted server from untrusted data? As a first step in this direction, we propose the notion of safe enclosures. Intu ..."
Abstract
- Add to MetaCart
. Intuitively, a safe enclosure is a cryptographic primitive that encapsulates data in a way that allows to perform some computation on it, while at the same time protecting the server from malicious data. Furthermore, a safe enclosure should come equipped with a dedicated protocol that implements the enclosing
Results 11 - 20
of
58,038