Combined hardware and cryptographic user data protection in personal computer systems and networks
نویسندگان
چکیده
Some methods for combined hardware and cryptographic protection of user data in personal computer systems and networks are described and considered in the paper. It is given an overview of the main types of cryptography, described ways of key distribution and the most known cryptographical algorithms at the beginning of the paper. Then the paper presents and describes practically implemented system of usage of cryptographic algorithms and protection of user data on the personal computer. It is solution that has been developed in Java programming language which combines hardware and software protection and can be also used in personal computer networks. It allows users to protect data by encrypting data files using one of cryptographic algorithms and protection of any user data from a computer using symmetric or asymmetric cryptography. The software is intended for use of only authorized users with appropriate user personal data.
منابع مشابه
Data Protection in Microcomputer Systems and Networks
The possibilities and ways for data protection in microcomputer systems and their networks are considered and described in the paper. The overview of the most important threats and attacks on security of microcomputer systems and networks is given first. Then, the possibilities and ways for protection of those systems and data are described. Finally, the paper provides a detailed description of...
متن کاملMerging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems
In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...
متن کاملOptimal Combined and Adaptive Protection of Active Distribution Networks Considering Different System Topologies Incorporating Optimal Selection of Standard Relay Curves
The change in the topology of active distribution networks (ADNs) is one of the essential challenges that might affect the protection schemes. The conventional protection schemes based on base topology result in some coordination constraint violations in other topologies due to the outage of upstream substations and distributed generation units. In this article, new combinational and adaptive p...
متن کاملTrust Classification in Social Networks Using Combined Machine Learning Algorithms and Fuzzy Logic
Social networks have become the main infrastructure of today’s daily activities of people during the last decade. In these networks, users interact with each other, share their interests on resources and present their opinions about these resources or spread their information. Since each user has a limited knowledge of other users and most of them are anonymous, the trust factor plays an import...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کامل