Results 31 to 40 of about 750 (85)

A Comparison of the Standardized Versions of ECIES [PDF]

open access: yes, 2010
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor   +3 more
core  

An entity access control model for network services management [PDF]

open access: yes, 2005
The Network Services Management Framework tries to overcome the most important limitations of present network management frameworks, namely the most widely supported framework – the Internet Network Management Framework – by defining a management ...
Dias, Bruno
core  

High Throughput Implementation of RIPEMD-160 using Unfolding Transformation [PDF]

open access: yes, 2018
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HMAC) and other data security application. There are different types of hash function such as MD5, SHA-1, RIPEMD-160, SHA-2 and others.
Kuryati, Binti Kipli   +5 more
core  

Проблеми і тенденції розвитку апаратних засобів захисту інформації [PDF]

open access: yes, 2002
Розглядаються сучасні апаратні засоби реалізації криптографічних алгоритмів, криптографічних функцій та криптографічних протоколів, їх параметри та напрямки розвитку.Нardware for realization of modern cryptographic algorithms, functions and protocols ...
Коркішко, Тимур   +3 more
core  

Сравнительный анализ характеристик и принципов построения стандартов ЭЦП на свойствах эллиптических кривых [PDF]

open access: yes, 2003
Розглядаються державні та галузеві стандарти цифрового підпису, які використовують особливості еліптичних кривих. Обґрунтовуються умови необхідності введення більш криптографічно стійких алгоритмів. Робиться порівняльний аналіз прийнятих стандартів ЕЦП з
Кочубинский, Анатолий   +1 more
core  

The implementation of Logiweb [PDF]

open access: yes
This paper describes the implementation of the ‘Logiweb ’ system with emphasis on measures taken to support classical reasoning about programs. Logiweb is a system for authoring, storing, distributing, indexing, checking, and rendering of ‘Logiweb pages’.
Klaus Grue
core  

Получение булевых преобразований специальных классов для построения эффективных алгоритмов защиты информации [PDF]

open access: yes, 2008
This paper presents investigation of nonlinear Boolean transformations inverse for which are ambiguous and its application in cryptographical algorithms. A new method for designing such class of Boolean trans-formations is suggested.
Зюзя, А. А.   +2 more
core  

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor [PDF]

open access: yes, 2002
Authentication is the process of confirming an identity. In the context of network interactions, authentication involves the confident identification of one party by another party.
Ayad, Mustafa Abdsalam
core  

ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION [PDF]

open access: yes
Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below.
Alexandru Pîrjan
core  

Home - About - Disclaimer - Privacy