Armour for Nebulous Data using Secret Writing
نویسندگان
چکیده
منابع مشابه
Secure and Compressed Secret Writing using DES and DEFLATE algorithm
A new secret writing using DES and DEFLATE algorithm is explored by improving the previous attempts in this sense in terms of security and compression. A Matching Pursuit algorithm using redundant basis decomposition technique is used to securely hide a message. The stability and computational complexity problems are solved by introducing new selection and update rules working entirely in the i...
متن کاملA Few Words on Secret Writing
As we can scarcely imagine a time when there did not exist a necessity, or at least a desire, of transmitting information from one individual to another, in such manner as to elude general comprehension; so we may well suppose the practice of writing in cipher to be of great antiquity. De La Guilletiere, therefore, who, in his "Lacedaemon Ancient and Modern," maintains that the Spartans were th...
متن کاملNebulous Mechanisms
Friday " I don't see what's so funny? " " Really, " Dr. Egerton continued to force a thin dry chuckle. " Because I think it's pretty funny. Don't you feel funny even saying it? " " No I do not feel funny saying it, " XienCheng spat back with disdain. " Because it isn't funny. It isn't funny at all. Do you have any idea how much money the Ceres mine lost last week? " " I have no idea, " Egerton ...
متن کاملmetrics for the detection of changed buildings in 3d old vector maps using als data (case study: isfahan city)
هدف از این تحقیق، ارزیابی و بهبود متریک های موجود جهت تایید صحت نقشه های قدیمی سه بعدی برداری با استفاده از ابر نقطه حاصل از لیزر اسکن جدید شهر اصفهان می باشد . بنابراین ابر نقطه حاصل از لیزر اسکنر با چگالی حدودا سه نقطه در هر متر مربع جهت شناسایی عوارض تغییر کرده در نقشه های قدیمی سه بعدی استفاده شده است. تمرکز ما در این تحقیق بر روی ساختمان به عنوان یکی از اصلی ترین عارضه های شهری می باشد. من...
Security Limitations of Using Secret Sharing for Data Outsourcing
Three recently proposed schemes use secret sharing to support privacy-preserving data outsourcing. Each secret in the database is split into n shares, which are distributed to independent data servers. A trusted client can use any k shares to reconstruct the secret. These schemes claim to offer security even when k or more servers collude, as long as certain information such as the finite field...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.5437