Ara
Toplam kayıt 24, listelenen: 1-10
On the hadamard product of balancing matrix and balancing matrix
(Işık University Press, 2015)
In this paper, the matrix QnB ◦ Q−nB which is the Hadamard product of both balancing QnB matrix and balancing Q−nB matrix is introduced. Some properties of the Hadamard product of these matrices are investigated. A different ...
Application of Laplace transform to cryptography using linear combination of functions
(Işık University Press, 2021)
The strength of nations, organizations such as military, intelligence agency, hinges primarily on its ability to keep sensitive information secure from intruders. Today, cryptography is used to protect mobile communication, ...
Algebraic construction of semi bent function via known power function
(Işık University Press, 2021)
The study of semi bent functions (2- plateaued Boolean function) has attracted the attention of many researchers due to their cryptographic and combinatorial properties. In this paper, we have given the algebraic construction ...
On key exchange method via topological concepts
(Işık University Press, 2019)
Key exchange algorithms such as the Diffie-Hellman method are used to determine a common secret key which will be used in symmetric key algorithms in cryptography. In this paper, we give a key exchange algorithm which ...
Dilemma between security and privacy on the internet
(Işık Üniversitesi, 2005-07-31)
In this thesis, the following issues are discussed. Even in today society, it is hard to talk about security and privacy. And no one can imagine what will be structure of tomorrow society. We study what are the internet ...
GSM and GPRS security
(Işık Üniversitesi, 2004-09)
In this thesis study, today's popular mobile voice (GSM) and data (GPRS) communication technologies (as an intorduction) and their security were studied. GSM arhitecture, key components of the GSM, security fonctions, and ...
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
(IEEE, 2006-08)
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the ...
Cryptanalysis of image encryption with compound chaotic sequence
(IEEE, 2009)
Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ...
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
Deterministic generation of large scale atomic W states
(Optical Soc Amer, 2016-05-30)
We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum ...