نتایج جستجو برای: enhancement of security structures
تعداد نتایج: 21213857 فیلتر نتایج به سال:
Iris Recognition is considered as one of the best Biometric methods used for human identification and verification, because of its unique feature that differ from one person to another, and its importance in the security field. We proposed an algorithm using a system based on Local Binary Pattern and histogram approaches for feature extraction, and Linear Vector Quantization classifier for clas...
Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time de...
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, we will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols...
Companies tend to adopt security approaches that align with some subset of the four categories of IS security techniques checklists, risk analysis, formal methods and soft modeling. To develop a structure of secure IS that upholds confidentiality, integrity and availability of information there remains a need for an integral security model that incorporates the benefits of other security design...
Data <span>encryption process and key generation techniques protect sensitive data against any various attacks. This paper focuses on generating secured cipher keys to raise the level of security speed integrity checking by using MinHash function. The methodology is based applying cryptographic algorithms rivest-shamir-adleman (RSA) advanced encryption standard (AES) generate keys. These ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید