Filters








46,682 Hits in 2.6 sec

New Media for Teaching Applied Cryptography and Network Security [chapter]

Ji Hu, Dirk Cordel, Christoph Meinel
2006 Lecture Notes in Computer Science  
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and network security.  ...  The application of those media is helpful to reduce investment and administration costs as well as effectively support security experiments which previously had to be done in conventional security laboratories  ...  The Tele-Lab IT-Security project at the HPI has developed new media to support learning/teaching applied cryptography and network security.  ... 
doi:10.1007/11876663_41 fatcat:gywajv6gibbzhilshyhus6pfie

Chaotic Electronic Circuits in Cryptography [chapter]

Matej alamon
2012 Applied Cryptography and Network Security  
The last fifth chapter is assigned to the summary of findings and possibilities to solve some problems of the so called chaotic cryptography.  ...  296 The third chapter deals with a usage of chaotic circuits in cryptography.  ...  When using this kind of systems in www.intechopen.com Applied Cryptography and Network Security 298 cryptography, these characteristics are consequently transferred into cryptosystems.  ... 
doi:10.5772/36449 fatcat:6twqrh2t2ngcrh5rc2rtlwsnia

Research on DNA Cryptography [chapter]

Yunpeng Zhang, Liu He Bochen Fu
2012 Applied Cryptography and Network Security  
358 Technology and software DNA cryptography is a subject of study about how to use DNA as an information carrier and it uses modern biotechnology as a measure to transfer ciphertext into plaintext.  ...  Thus, biotechnology plays an important role in the field of DNA cryptography. In this part we will introduce some of the DNA biotechnology and software of the field of DNA.  ...  In these 24 programs, there are only 8 programs 0123/CTAG, 0123/CATG, 0123/GTAC, 0123/GATC, 0123/TCGA, www.intechopen.com Applied Cryptography and Network Security 362 0123/TGCA, 0123/ACGT, 0123/AGCT match  ... 
doi:10.5772/34510 fatcat:77nezfbaeff4lbzohk3eoc6t2y

Security Approaches for Information-Centric Networking [chapter]

Walter Wong, Maurcio Ferreira
2012 Applied Cryptography and Network Security  
For each test case, we collected 10 samples and considered the average value to plot the graphics. 88 Applied Cryptography and Network Security Fig. 8 . Evaluation topology with one CR.  ...  The balanced tree is created over a partitioned content and later the skewed leaves are added under the balanced tree, creating 76 Applied Cryptography and Network Security www.intechopen.com one extra  ...  Security Approaches for Information-Centric Networking, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35557 fatcat:m5psjnyqhvh3vnfqytatfht5qm

Secure Platform Over Wireless Sensor Networks [chapter]

Marco Pugliese, Luigi Pomante, Fortunato Santucci
2012 Applied Cryptography and Network Security  
This chapter is organized as follows: Sec. 2 deals with the security services provided by the "Secure Platform", Sec. 3 and Sec. 4 describe fundamental algorithms and architectures supporting those security  ...  provided by an Application Execution Environment (AEE): this service package is the core feature of the proposed "secure platform" that is proposed, analyzed and tested in this chapter.  ...  Furthermore, the research leading to these results has received funding from the European Union Seventh Framework Programme [FP7/2007[FP7/ -2013 under grant agreement n° 257462 HYCON2 Network of excellence  ... 
doi:10.5772/34607 fatcat:ldztqrio5jg7najoujobtsxmwu

Security from Location [chapter]

Di Qiu, Dan Boneh, Sherman Lo, Per Enge
2012 Applied Cryptography and Network Security  
As with all radio-based systems, Loran-C radio signals are distorted by buildings and other objects Applied Cryptography and Network Security 36 causing measurements to change greatly over short distances  ...  www.intechopen.comSecurity from Location www.intechopen.comApplied Cryptography and Network Security www.intechopen.com  ...  Security from Location, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/33981 fatcat:bmedhla3mrb7fablcsyb5cm634

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [chapter]

Jaydip Sen
2012 Applied Cryptography and Network Security  
www.intechopen.com Applied Cryptography and Network Security 8  Authentication protocols should be compatible with standards.  ...  Its inverse function 1 () i fy  is defined as 1 () ( , ) i fy     www.intechopen.com Applied Cryptography and Network Security 26 .( mod )mod .m o d K iii Kg p q  ...  Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/39176 fatcat:lvh54ipvizdo3drqtro2qbhece

Privacy-Secure Digital Watermarking for Fair Content Trading [chapter]

Mitsuo Okada
2012 Applied Cryptography and Network Security  
Next, determine x ∈ Z p and 128 Applied Cryptography and Network Security www.intechopen.com Privacy-Secure Digital Watermarking for Fair Content Trading 5 then calculates y = g x mod p where x secret  ...  for Fair Content Trading www.intechopen.com Applied Cryptography and Network Security www.intechopen.com Privacy-Secure Digital Watermarking for Fair Content Trading Privacy-Secure Digital Watermarking  ...  Privacy-Secure Digital Watermarking for Fair Content Trading, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/36378 fatcat:hryqtjvzvrdhfacxvchss3yfni

Quantum Key Management [chapter]

Peter Schartner, Stefan Rass, Martin Schaffer
2012 Applied Cryptography and Network Security  
Cryptography and Network Security www.intechopen.com Quantum Key Management Applied Cryptography and Network Security www.intechopen.com Quantum Key Management  ...  It is the combination of mechanisms (and QKD is only 240 Applied Cryptography and Network Security www.intechopen.com one of them), that makes the defense against an adversary strong.  ...  Quantum Key Management, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35400 fatcat:uysnzziqwngjrjwa67mlvtsjpa

Securing a Telecom Services Using Quantum Cryptographic Mechanisms [chapter]

Abdallah Handoura
2012 Applied Cryptography and Network Security  
Therefore, the services of security provides for the current network will not be sufficient for IN, the goal is more long.  ...  The defying of the aspect of the new security functions has to make then be publicly usable, economically feasible and insured all its at the same time.  ...  The cryptography technique that allows detecting a spy and realized the security is the technique of quantum cryptography www.intechopen.com Applied Cryptography and Network Security 256 Quantum cryptography  ... 
doi:10.5772/33977 fatcat:skgwxpoyl5c63o334yyb7git7m

Key Establishment Protocol for Wireless Sensor Networks [chapter]

Ali Fanian, Mehdi Berenjkoub
2012 Applied Cryptography and Network Security  
Despite ideal resilience, this scheme is not scalable, and is not memory efficient, particularly in large networks.  ...  In this protocol, both efficient resource consumption and perfect security are the goals this protocol.  ...  Key Establishment Protocol for Wireless Sensor Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35000 fatcat:ucnzz2eqwfhcrjsm7hkd5fbosq

Modern Technologies Used for Security of Software Applications [chapter]

Tatiana Hodorogea, Ionas Szilard
2012 Applied Cryptography and Network Security  
www.intechopen.com Applied Cryptography and Network Security 338 JSSE and authentication through JAAS.  ...  The security provider interface the means by which different security implementations may be plugged into the security package as message digests, encryption, digital signatures and keys, through JCE,  ...  Security protections can be applied to WLAN: network monitoring is a good defense to observe the network to be informed if something strange happens.  ... 
doi:10.5772/34013 fatcat:kwxpe2sisfh6hkk7ylz7csearq

Quantum Cryptography [chapter]

W. Chen, H.-W. Li, S. Wang, Z.-Q. Yin, Z. Zhou, Y.-H. Li, Z.-F. Han, G.C. Guo
2012 Applied Cryptography and Network Security  
In section 3, the implementation technolgies of a secure and stable point-to-point QKD system and QKD network are presented.  ...  Fiber is the most widely used quantum channel, in which the polariztion and the phase encoding QKD schemes can be applied.  ...  Han and G.C. Guo (2012). Quantum Cryptography, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35210 fatcat:lkec32s3ovco5falaos6rcyq3m

Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem [chapter]

Pellicer-Lostao Carmen, Lpez-Ruiz Ricardo
2012 Applied Cryptography and Network Security  
Chaos based number generators are easy to use and highly configurable. This makes them a valuable tool for this application.  ...  This is that, though chaotic cryptography may be considered at present peripheral in circles of conventional crypto, chaotic number generation may have attractive applications as simulation engines in  ...  Cryptography and Network Security  ... 
doi:10.5772/36419 fatcat:3u27y3qnhbawxdypbntndp4xmm

Applied Cryptography and Noise Resistant Data Security

Iqtadar Hussain, Fawad Ahmed, Umar M. Khokhar, Amir Anees
2018 Security and Communication Networks  
Acknowledgments We would also like to thank all the reviewers who have participated in the review process of the articles submitted to this special issue and the special issue coordinators and acknowledge  ...  Zhang et al. presented an Hindawi Security and Communication Networks Volume 2018, Article ID 3962821, 2 pages https://doi.org/10.1155/2018/3962821 efficient certificateless generic signcryption scheme  ...  The proposed scheme can be applied on the other kinds of data as well, such as text, audio, and digital images.  ... 
doi:10.1155/2018/3962821 fatcat:tbdcpbvo7fa5nng3e3vbjntktm
« Previous Showing results 1 — 15 out of 46,682 results