نتایج جستجو برای: encryption

تعداد نتایج: 27368  

2012
JOHN SINGH

Major issues in video data transfer over the internet are security and speed. For fast transmission over the network, the video data should be compressed before transmission. Joint compression and encryption algorithms employ compression before encryption for secured and fast data transfer over the internet. In this paper, a joint compression and encryption algorithm, Puzzle Fast Random Bit Enc...

2011
Cheng Chen Zhenfeng Zhang Dengguo Feng

Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is more powerful and expressive. More useful cryptograp...

2014
Aumreesh Saxena Sourabh Singh

The world It know today would be impossible without cryptography. This Paper are presenting study of cryptography and problem associating with existing encryption model is also presented. Furthermore this is proposing encryption model. This encryption model is based on the block cipher concept where it will be encrypt and decrypt any type of data file. The primary goal of this paper is to impro...

2006
K. Jaganathan L. Zhu J. Brezak

The Microsoft Windows 2000 implementation of Kerberos introduces a new encryption type based on the RC4 encryption algorithm and using an MD5 HMAC for checksum. This is offered as an alternative to using the existing DES-based encryption types. The RC4-HMAC encryption types are used to ease upgrade of existing Windows NT environments, provide strong cryptography (128-bit key lengths), and provi...

2010
Dongdong Sun Colin Boyd Juan Manuel González Nieto

Predicate encryption has an advantage over traditional publickey or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definition...

Journal: :CoRR 2012
Yixin Liu Haipeng Zhang Tao Feng

In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...

2009
K. L. Man M. Mercaldi H. L. Leung

This paper presents our industrial experience on the implementation of SpeedyDes3 encryption which is a speed up version of the Des3 encryption. This SpeedyDes3 encryption improves the standard Des3 encryption by means of speed and memory usage. Our SpeedyDes3 encryption is particular suitable for use/running in small systems. We have applied the SpeedyDes3 for the encryption of data in video p...

2016
Basavaprabhu

A Cloud data storage system consists of collection of storage servers over the internet which provides long term storage services. The data stored in a third party’s cloud system may cause serious concern over data confidentiality. To keep sensitive user data confidential against un-trusted servers and to provide security, access control in cloud there are some cryptographic techniques speciall...

2014
Manpreet Kaur

The growth rate of the internet exceeds day by day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this review paper we will have an overview of encryption techniques. This paper mainly focuses ...

Journal: :International Journal Of Engineering And Computer Science 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید