Information security. 1. Information security and cryptography.

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Cryptography and Security of Information Systems

We show concept of BB84 quantum key distribution (QKD) protocol and analyze its use as an information system. The difference between classical and quantum cryptography is presented in a way of understanding the main advantage of quantum information processing over classical information processing. At the end of the article, we present today and future use of quantum cryptography and possible im...

متن کامل

Special Section on Cryptography and Information Security

This Special Section will be included in the Journal issue of the IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences (IEICE Trans. Fundamentals, for short), which will be published in January, 2019. The objective of the Special Section is to stimulate research in the area of cryptography and information security. You are strongly encouraged to submit origina...

متن کامل

Combining Conventional Cryptography with Information Theoretic Security

This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and assumptions on the eavesdroppers capabilities. A gradual relaxation of the restrictions on the eave...

متن کامل

Quantum cryptography: a practical information security perspective

Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/...

متن کامل

Information and Information Security

Insecurity, threats to information, need to defend information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction are nearly always deliberate. Accidents, which in 90ties were responsible for most Information Security issues a plane flows into an office building destroying all computers in it, employee mistakes ("Format C:"), fire,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Institute of Television Engineers of Japan

سال: 1988

ISSN: 0386-6831,1884-9652

DOI: 10.3169/itej1978.42.1285