Armour for Nebulous Data using Secret Writing

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Compressed Secret Writing using DES and DEFLATE algorithm

A new secret writing using DES and DEFLATE algorithm is explored by improving the previous attempts in this sense in terms of security and compression. A Matching Pursuit algorithm using redundant basis decomposition technique is used to securely hide a message. The stability and computational complexity problems are solved by introducing new selection and update rules working entirely in the i...

متن کامل

A Few Words on Secret Writing

As we can scarcely imagine a time when there did not exist a necessity, or at least a desire, of transmitting information from one individual to another, in such manner as to elude general comprehension; so we may well suppose the practice of writing in cipher to be of great antiquity. De La Guilletiere, therefore, who, in his "Lacedaemon Ancient and Modern," maintains that the Spartans were th...

متن کامل

Nebulous Mechanisms

Friday " I don't see what's so funny? " " Really, " Dr. Egerton continued to force a thin dry chuckle. " Because I think it's pretty funny. Don't you feel funny even saying it? " " No I do not feel funny saying it, " XienCheng spat back with disdain. " Because it isn't funny. It isn't funny at all. Do you have any idea how much money the Ceres mine lost last week? " " I have no idea, " Egerton ...

متن کامل

metrics for the detection of changed buildings in 3d old vector maps using als data (case study: isfahan city)

هدف از این تحقیق، ارزیابی و بهبود متریک های موجود جهت تایید صحت نقشه های قدیمی سه بعدی برداری با استفاده از ابر نقطه حاصل از لیزر اسکن جدید شهر اصفهان می باشد . بنابراین ابر نقطه حاصل از لیزر اسکنر با چگالی حدودا سه نقطه در هر متر مربع جهت شناسایی عوارض تغییر کرده در نقشه های قدیمی سه بعدی استفاده شده است. تمرکز ما در این تحقیق بر روی ساختمان به عنوان یکی از اصلی ترین عارضه های شهری می باشد. من...

Security Limitations of Using Secret Sharing for Data Outsourcing

Three recently proposed schemes use secret sharing to support privacy-preserving data outsourcing. Each secret in the database is split into n shares, which are distributed to independent data servers. A trusted client can use any k shares to reconstruct the secret. These schemes claim to offer security even when k or more servers collude, as long as certain information such as the finite field...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2020

ISSN: 2321-9653

DOI: 10.22214/ijraset.2020.5437