Browsing by Subject "Data encryption (Computer science)"
Now showing items 1-5 of 5
-
A new fingerprint design using optical orthogonal codes
(2014)Digital fingerprinting has been proposed to restrict illegal distribution of digital media, where every piece of media has a unique fingerprint as an identifying feature that can be traceable. However, fingerprint systems ... -
Access control scheme for partially ordered set hierarchy with provable security
(2005)In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ... -
Indirect key derivation schemes for key management of access hierarchies
(2004)In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ... -
Observer-based chaos synchronization for secure communications
(2006)Chaos, with reference to chaos theory, refers to an apparent lack of order in a system that, nevertheless, obeys particular laws or rules. The chaotic signals generated by chaotic systems have some properties such as ... -
Secret sharing for mobile agent cryptography
(2003)A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ...