Implementation of a Data Protection Model dubbed Harricent_RSECC

نویسندگان

چکیده

Every organization subsists on data, which is a quintessential resource. Quite number of studies have been carried out relative to procedures that can be deployed enhance data protection. However, available literature indicates most authors focused either encryption or encoding schemes provide security. The ability integrate these techniques and leverage their strengths achieve robust protection the pivot this study. As result, model, dubbed Harricent_RSECC has designed implemented study’s objective through utilization Elliptic Curve Cryptography (ECC) Reed Solomon (RS) codes. model consists five components, namely: message identification, generator module, encoding, signature. result generation codewords; cipher texts; generated hash values are utilized detect correct corrupt data; obfuscates sign respectively, during transmission storage. contribution paper combine ensure confidentiality, authenticity, integrity, non-repudiation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a study on insurer solvency by panel data model: the case of iranian insurance market

the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

Implementation of the Extended Schematic Protection Model

Protection models provide a formalism for specifying control over access to information and other resources in a multi-user computer system. One such model, the Extended Schematic Protection Model (ESPM), has expressive power equivalent to the monotonic access matrix model of Harrison, Ruzzo, and Ullman [7]. Yet ESPM retains tractable safety analysis for many cases of practical interest. Thus E...

متن کامل

A Mathematical Model for Flood Protection

Many regions in the world are protected against flooding by a dike, which may be either natural or artificial. We deal with a model for finding the optimal heights of such a dike in the future. It minimizes the sum of the investments costs for upgrading the dike in the future and the expected costs due to flooding. The model is highly nonlinear, nonconvex, and infinite-dimensional. Despite this...

متن کامل

A Model for Effective Implementation of Health Policy in Iran

Background: Policies will be communicated to administrators after being drafted and approved. Sometimes, they undergo changes at the implementation stage that remove them from their goals. The aim of this study was to provide a model to improve the quality of policy implementation in the health system of Iran. Methods: This qualitative study was conducted in 2018. In order to collect the requi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2022

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2022.0130517