نتایج جستجو برای: simultaneous encryption

تعداد نتایج: 143810  

Journal: :journal of advances in computer research 0
fereshteh ghanbari adivi m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran mohammad mehrnia m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...

Journal: :تحقیقات بازاریابی نوین 0
abdolghader pourali

mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. a mobile payment system should be beneficial for all related persons. for a payment system to be a successful system, end-user, seller, exporter and operators should see a additional value in it. end-user pr...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :IACR Cryptology ePrint Archive 2008
Maria Isabel Gonzalez Vasco Florian Hess Rainer Steinwandt

Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair—so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of...

Journal: :Preview 2019

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

Journal: :روش های عددی در مهندسی (استقلال) 0
محمدرضا عارف m. r. aref فرامرز هندسی f. hendesi مسعود عمومی m. omoomi

0

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید