Combined hardware and cryptographic user data protection in personal computer systems and networks

نویسندگان

  • Adnan Ramakić
  • Zlatko Bundalo
چکیده

Some methods for combined hardware and cryptographic protection of user data in personal computer systems and networks are described and considered in the paper. It is given an overview of the main types of cryptography, described ways of key distribution and the most known cryptographical algorithms at the beginning of the paper. Then the paper presents and describes practically implemented system of usage of cryptographic algorithms and protection of user data on the personal computer. It is solution that has been developed in Java programming language which combines hardware and software protection and can be also used in personal computer networks. It allows users to protect data by encrypting data files using one of cryptographic algorithms and protection of any user data from a computer using symmetric or asymmetric cryptography. The software is intended for use of only authorized users with appropriate user personal data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Protection in Microcomputer Systems and Networks

The possibilities and ways for data protection in microcomputer systems and their networks are considered and described in the paper. The overview of the most important threats and attacks on security of microcomputer systems and networks is given first. Then, the possibilities and ways for protection of those systems and data are described. Finally, the paper provides a detailed description of...

متن کامل

Merging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems

In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...

متن کامل

Optimal Combined and Adaptive Protection of Active Distribution Networks Considering Different System Topologies Incorporating Optimal Selection of Standard Relay Curves

The change in the topology of active distribution networks (ADNs) is one of the essential challenges that might affect the protection schemes. The conventional protection schemes based on base topology result in some coordination constraint violations in other topologies due to the outage of upstream substations and distributed generation units. In this article, new combinational and adaptive p...

متن کامل

Trust Classification in Social Networks Using Combined Machine Learning Algorithms and Fuzzy Logic

Social networks have become the main infrastructure of today’s daily activities of people during the last decade. In these networks, users interact with each other, share their interests on resources and present their opinions about these resources or spread their information. Since each user has a limited knowledge of other users and most of them are anonymous, the trust factor plays an import...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014