Ara
Toplam kayıt 24, listelenen: 21-24
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
(Elsevier Science BV, 2009-09-07)
In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ...
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ...
NFC loyal: A Beneficial model to promote loyalty on smart cards of mobile devices
(IEEE, 2010)
Near Field Communication (NFC) as a new emerging technology currently tries to find a suitable ecosystem. Development of new standards such as secure element, secure channel, as well as Java Card enables creating new ...
Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing
(IEEE, 2024-03-25)
In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys ...