Encryption and Secure Computer Networks
نویسندگان
چکیده
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملParallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks
These security-enhanced communication tools in a wide-area Globus test bed that we are constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow largescale application experiments and hence provide feedback on how our security mechanisms work in practical situations. It seems certain that encryption performance will be a bottleneck in many situations. ...
متن کاملSecure Distribution of Multimedia Using Geo-Encryption and Wireless Networks
Distribution of motion picture content digitally to movie theatres allows production studios to control the exact timing and security of the transfer of their proprietary content. With the increasing use of digital formats for motion pictures, one of the main concerns in the distribution of multimedia is the risk of piracy. As the data is stored in a digital format, the risk for copying of cont...
متن کاملa cca2-secure incomparable public key encryption scheme
in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...
متن کاملA Secure Encryption Logic for Communication in Wireless Sensor Networks
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated computational and communication overheads in terms of energy consumption using Directed Diffusion protocol. Public-key cryptography has been observed to suffer from high computational complexity and overhead. The symmetric-key schemes can be utilized more efficiently in order to provide more sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 1979
ISSN: 0360-0300,1557-7341
DOI: 10.1145/356789.356794