نتایج جستجو برای: key technology

تعداد نتایج: 980060  

Journal: :CoRR 2012
Arindam Sarkar J. K. Mandal

In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been proposed through recursive replacement using mutated character code generation for wireless communication of data/information. Multilayer perceptron transmitting systems at both ends accept an identical input vector, generate an output bit and the network are trained based on the output bit w...

Multistage stochastic programming is a key technology for making decisions over time in an uncertain environment. One of the promising areas in which this technology is implementable, is medium term planning of electricity production and trading where decision makers are typically faced with uncertain parameters (such as future demands and market prices) that can be described by stochastic proc...

2015
Ruhma Tahir Hasan Tahir Klaus D. McDonald-Maier

Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lig...

2014
Jordan S. Cotler Peter W. Shor

A new relativistic orthogonal states quantum key distribution protocol. The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. We introduce a new relativistic orthogonal states quantum key distribution protocol which leverages the properties of both quantum mechanics and special relativity to securely encode multiple bits onto the ...

2017
A. Praveen M.Thukaram Reddy

Cloud computing becomes more and more adaptive technology for the current computing world. In the cloud environment to provide infrastructure resources to the end customer they are using virtualization technology. Virtualization is built on a software module called hypervisors. By implementing virtualization in the cloud the same resources are shared among different end customers. This may lead...

2001
M. Mar Albà Josep Domingo-Ferrer Francesc Sebé

Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for implementation of large-scale certification authorities (CAs). In most aspects, the CVT approach outperforms previous approaches like X.509 and certificate revocation lists, SDSI/SPKI, certificate revocation trees, etc....

Journal: :IEEE Trans. Software Eng. 1996
Rajashekar Kailar

| In most commercial and legal transactions, the ability to hold individuals or organizations accountable for transactions is important. Hence, electronic protocols that implement commercial transactions must be designed to provide adequate accountability assurances for transacting parties. Without such assurances, electronic transactions can be susceptible to disputes. Currently, protocol desi...

Journal: :J. Inf. Sci. Eng. 2008
Jeong-Beom Kim MoonBae Song Chong-Sun Hwang SangKeun Lee

As a de facto standard protocol, Internet protocol security (IPSec) provides secure communication between networked systems. One of the most common issues today in large-scale virtual private networks using IPSec is the problem of a stale security association, which occurs when the device at one end of the tunnel maintains the tunnel state but the other end does not. Internet key exchange (IKE)...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید