Given the escalating importance of cybersecurity, it becomes increasingly beneficial for a diverse community to comprehend fundamental security mechanisms. Among these, the RSA algorithm stands out as a crucial compon...
详细信息
CSCW (Computer Supported Cooperative Work )means a group of people cooperate to finish the sametask with the help of computers. Under such a workingenvironment, a safety mechanism is vital important toensure unwanted ...
详细信息
ISBN:
(纸本)0780379411
CSCW (Computer Supported Cooperative Work )means a group of people cooperate to finish the sametask with the help of computers. Under such a workingenvironment, a safety mechanism is vital important toensure unwanted information leakage. At present theencryption algorithms widely used in CSCW system areinefficient, and can't realize the Real-TimeCommunication Model satisfactorily. DES and ECC areboth widely recognized data encryption algorithms,which have already been applied to CSCW securitysystem, but each has his own strengths and *** is efficient but its key is easily revealed, the key ofECC is well managed, but the process efficiency is lowerthan DES. This paper puts forward a combinedencryption algorithm based on 3DES and ECC toimprove the performance of the CSCW system *** is proved that the algorithm is feasible and effective.
Homomorphic permutation is fundamental to privacy-preserving computations based on batch-encoding homomorphic encryption. It underpins nearly all homomorphic matrix operation algorithms and predominantly influences th...
详细信息
In this paper, we study generalized cryptographic semi-regular sequences, which are expected to generic in the space of homogeneous polynomial sequences on which the coordinate rings have Krull dimension one. We provi...
详细信息
Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information which has stored by the bank is considered as pri...
详细信息
ISBN:
(纸本)9781467387224
Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information which has stored by the bank is considered as private and has to be saving securely by bank. Only legal staff of bank, also legal customers can operate any of the tasks. Hence, bank has own system to protect its transaction tasks such as online and offline transactions. Bank account hacking has caused millions money losses around the world. It is important to achieve how the security aspects in a banking system can influence great lost to the financial institution. This paper reports on the aiming at identifying and classifying Mobile banking payment security challenges. First, different security risks of mobile banking have been presented. In addition, different methods of encryption have been presented. Moreover, our method which has two layers of security has been presented. Furthermore, for preparing the security of the Network Layer, our method will authorize the Message format with Check sum.
We first describe the relation between discrete logarithms and two well-known asymmetric security schemes, RSA and Elliptic Curve Cryptography. Next, we present the foundations of lattice-based cryptography which is t...
详细信息
Pairing-Based Cryptography (PBC) is a sub-field of elliptic curve cryptography that has been used to design ingenious security protocols including Short Signatures (SS), Identity-Based encryption (IBE), and Attribute-...
详细信息
There are many drawbacks in current encryptionalgorithms in respect of security, real-time performanceand so on, and researchers are presenting variousalgorithms. Among them, the Elliptic CurveCryptography (ECC) is ev...
详细信息
ISBN:
(纸本)0780379411
There are many drawbacks in current encryptionalgorithms in respect of security, real-time performanceand so on, and researchers are presenting variousalgorithms. Among them, the Elliptic CurveCryptography (ECC) is evolving as an importantcryptography, and shows a promise to be an alternativeof RSA. Small size, high security and other featurescharacterize ECC. Based on the theory of ECC, thispaper analyzes its advantages over othercryptographies and focuses on its principle. A practicalapplication implemented by Java is also presented. Atlast, some future works in ECC are indicated.
The National Institute of Standards and Technology (NIST) has finalized the selection of post-quantum cryptographic (PQC) algorithms for use in the era of quantum computing. Despite their integration into TLS protocol...
详细信息
This short communication shows that the Chessography encryption scheme is incorrect, redundant, and the the security claims based on the complexity of chess games are unjustified. It also demonstrates an insufficient ...
详细信息
暂无评论