68 Hits in 6.4 sec

Performance Evaluation of Ciphers Using CRYPTOOL 2.0

Kulwinder Kaur
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required.  ...  The encryption and decryption module include the key expansion module which generates the key for all iterations.  ...  over the Internet -this form of business is called electronic commerce or e-commerce.  ... 
doi:10.24297/ijct.v3i1a.2727 fatcat:foazbsnnrjb5xdhrvhemsqwwai


Hassan Alqahtani, Paul Sant
2017 Zenodo  
This paper defines the digital image security requirements, and investigates the proposed mechanism from watermarking, steganography, and encryption algorithms.  ...  The conducted investigation aims to highlight the features, weaknesses, strengths, and limitations as well, and compare between these mechanisms in term of defined criteria.  ...  RSA Encryption is the most widely used asymmetric key encryption system used for electronic commerce protocols [13] [14] . V.  ... 
doi:10.5281/zenodo.3957469 fatcat:obh3g3gu2jcz5lnvpo77bu6dne

A Review on Performance of Online Transaction Algorithms in Cloud Environment

Manju Subashini, Prabakaran D, IFET colllege of Engineering
2020 International Journal of Engineering Research and  
and addresses the security issues in cloud computing.  ...  This paper proposes a model that integrates the traditional authentication method with Hashing algorithm and performing a secured encryption using Elliptical Curve Cryptography (ECC).This model evades  ...  The unification of symmetric and asymmetric algorithm provides detention towards various attacks.  ... 
doi:10.17577/ijertv9is050301 fatcat:wshtlfdhfzdqppwkrow5hqbt74

Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity

Mina Deng, Bart Preneel
2008 2008 International Symposium on Electronic Commerce and Security  
Index Terms-e-commerce, security, watermarking protocol, anonymity, applied cryptography I.  ...  Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after  ...  On the other hand, the literature can also be categorized as symmetric schemes, asymmetric schemes, and anonymous schemes.  ... 
doi:10.1109/isecs.2008.103 dblp:conf/isecs/DengP08 fatcat:55hwznza2nhxreytkkyvzuuudm


Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption.  ...  This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)based applications which have been subjected to  ...  ACKNOWLEDGMENT The authors would like to thank the Ministry of Higher Education and the Research Management Institute, Universiti Teknologi MARA (UiTM)  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q

Encryption – use and control in E-commerce

Robert Bond
2012 Amicus Curiae  
In many electronic payment schemes and web access schemes for instance, these symmetric keys are also called session keys, for that very WHAT ELSE CAN BE DONE WITH CRYPTOGRAPHY?  ...  Modern cryptography falls into two main camps: symmetric or secret key cryptography, and asymmetric or public key cryptography.  ... 
doi:10.14296/ac.v2000i32.1354 fatcat:4osz7h2b5zdgjdzus4cwrk5rbi

The Importance of Cryptography in Digital Signatures

Dr.Yakubu Ajiji Maker
2020 Zenodo  
And Data security is the utmost critical issue in ensuring secure, The IoT (Internet of Things) is no [...]  ...  The detailed of the subject of network security and cryptography in digital signatures are then presented.  ...  There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions  ... 
doi:10.5281/zenodo.3685177 fatcat:5ywzt2hmx5hgbj4q366urnjsze

Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication

Jana Dittman, Martin Steinebach, Lucilla Croce Ferri, Claus Vielhauer, Ralf Steinmetz, Petra Wohlmacher, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr.
2001 Multimedia Systems and Applications IV  
The security of these mechanisms is mainly based on the authenticity of specific data like keys and attributes -both data must be dedicated to its owner in an authentic manner.  ...  Protecting the media of the future -securing the future of the media is an essential task for our new century.  ...  Astrid Mayerhöfer supported the design and evaluation of the biometric approach. We would like to thank them for many stimulating discussions and support.  ... 
doi:10.1117/12.448204 fatcat:lraenmkayvft7cmjey6jeryvgy

Secure Electronic Voting Using a Hybrid Cryptosystem and Steganography

Oladotun O. Okediran, Adeyemi A. Sijuade, Wajeed B. Wahab
2019 Journal of Advances in Mathematics and Computer Science  
Furthermore, a performance evaluation based on users' perception of the developed e-voting system showed that the system satisfied most of the generic security requirements for electronic voting.  ...  The electronic ballots casted via the system during experimental usage were encrypted using the hybrid RSA-AES algorithm to circumvent the problems of privacy, integrity and verifiability associated with  ...  Many security schemes and models have been proposed and developed for hemes and models were based on cryptography, watermarking, However, express literature survey revealed that most of these schemes are  ... 
doi:10.9734/jamcs/2019/v34i1-230201 fatcat:om26svtitrhgpa2bryxfuwxoua

Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

Jana Dittmann, Martin Steinebach, Petra Wohlmacher, Ralf Ackermann
2002 EURASIP Journal on Advances in Signal Processing  
Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional  ...  In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific  ...  Particularly, the setup of UMTS-technology based networks form a basis for the crowing of mobile business (M-Business) and especially mobile commerce (M-Commerce).  ... 
doi:10.1155/s1110865702000501 fatcat:fcr53heumret3nfkoxd7xgdp2a

A Study on Authentication Framework by using 2-D 3-D Image/Video Based Encryption

Shailesh Kumar, Dr. Yogesh Kumar Sharma, Dr. Keshava Prasanna
2018 International Journal of Engineering Research and  
Also an attempt is made to overcome the limitations of Steganography on the file size ratio and the security offered by Steganography.  ...  A novel geometric framework is proposed for analyzing 3D faces, with the specific goals of comparing, matching, and averaging their shapes.  ...  The applications such as ATM cards, computer passwords, online bank transaction, electronic commerce and group-oriented applications like video conferencing mainly depend on cryptography.  ... 
doi:10.17577/ijertv7is020073 fatcat:4pdnj2bbwbdwbfirtxmezpm4wu

Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform

Magdy Ibrahim ElSharkawy
2017 International Journal of Communication Networks and Information Security  
Accordingly, this led to an upsurge in research in the discipline of information security. cryptography plays a significant role in securing and verification of information exchanged via public communication  ...  The rapid growth of communication technology encouraged a rapidly rising demand for internet connectivity.  ...  Cryptography is utilized extensively in many fields such as electronic commerce, based banking applications such as Automated Teller Machines (ATM), and computer passwords.  ... 
dblp:journals/ijcnis/ElSharkawy17a fatcat:wkk4doqshjdnbloysrsf2a5nzq

Overview of multimedia content protection in consumer electronics devices

Ahmet M. Eskicioglu, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
2000 Security and Watermarking of Multimedia Contents II  
Recently, two fundamental groups of technologies, encryption and watermarking, have been identi"ed for protecting copyrighted digital multimedia content.  ...  This paper is an overview of the work done for protecting content owners' investment in intellectual property.  ...  Acknowledgements We would like to thank Dave Du$eld of Thomson Consumer Electronics for his contributions to several sections of this work.  ... 
doi:10.1117/12.384979 dblp:conf/sswmc/EskiciogluD00 fatcat:vmfmpjga6jajnmmkyn4ioqamtq

An overview of multimedia content protection in consumer electronics devices

Ahmet M Eskicioglu, Edward J Delp
2001 Signal processing. Image communication  
Recently, two fundamental groups of technologies, encryption and watermarking, have been identi"ed for protecting copyrighted digital multimedia content.  ...  This paper is an overview of the work done for protecting content owners' investment in intellectual property.  ...  Acknowledgements We would like to thank Dave Du$eld of Thomson Consumer Electronics for his contributions to several sections of this work.  ... 
doi:10.1016/s0923-5965(00)00050-3 fatcat:tbcryjn4d5anhihcryjxpwllge

Authentication Mechanisms for Preventing Cyber Crime and Providing Security in Cloud

Cyber crime is the phenomenon which interrupts the privacy and security for data storage, to overcome this cyber security is introduced.  ...  The inference of this paper is to focus on authentication mechanisms for providing security and preventing cyber crime activities in the cloud  ...  After collecting the data, we provided measures for implementing security and preventing cybercrime by authentication mechanisms in cloud.  ... 
doi:10.35940/ijitee.f1231.0486s419 fatcat:d2cdv3p6rna2bdyxooahtbp3li
« Previous Showing results 1 — 15 out of 68 results