Results 51 to 60 of about 311,948 (105)

Medical image integrity control combining digital signature and lossless watermarking

open access: yes, 2009
International audienceEnforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality ...
Coatrieux, Gouenou   +4 more
core   +2 more sources

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Получение булевых преобразований специальных классов для построения эффективных алгоритмов защиты информации [PDF]

open access: yes, 2008
This paper presents investigation of nonlinear Boolean transformations inverse for which are ambiguous and its application in cryptographical algorithms. A new method for designing such class of Boolean trans-formations is suggested.
Зюзя, А. А.   +2 more
core  

Malicious cryptography techniques for unreversable (malicious or not) binaries [PDF]

open access: yes, 2010
Fighting against computer malware require a mandatory step of reverse engineering. As soon as the code has been disassemblied/decompiled (including a dynamic analysis step), there is a hope to understand what the malware actually does and to implement a ...
Filiol, Eric
core  

An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor [PDF]

open access: yes, 2002
Authentication is the process of confirming an identity. In the context of network interactions, authentication involves the confident identification of one party by another party.
Ayad, Mustafa Abdsalam
core  

ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION [PDF]

open access: yes
Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below.
Alexandru Pîrjan
core  

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]

open access: yesSensors (Basel), 2022
Torres-Alvarado A   +5 more
europepmc   +1 more source

NSA Suite-B Cryptography algorithms [PDF]

open access: yes, 2011
Tato bakalářská práce s názvem Skupina algoritmů NSA Suite B Cryptography se zabývá algoritmy, které obsahuje sada Suite B. Ty slouží k větší ochraně dat a bezpečnosti při jejich přenosu přes nezabezpečené prostředí internetu. Dále obsahuje rozbor těchto
Rybka, Štěpán
core  

Home - About - Disclaimer - Privacy