875 resultados para RSA public-key cryptography
Resumo:
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image. © Springer Science+Business Media B.V. 2008.
Resumo:
Includes bibliography
Resumo:
Includes bibliography
Resumo:
Incluye Bibliografía
Resumo:
Includes Bibliography
Resumo:
Includes Bibliography
Resumo:
Includes bibliography
Resumo:
Incluye Bibliografía
Resumo:
Includes bibliography
Resumo:
Through the astute analysis of official statistics, we can gather a more complete picture of the economic performance of a given country, and understand more fully what have been its drivers, leading to a more effective use of national resources and a more efficient design of policy options. However, the myriad of information and numerical data across the system of macroeconomic statistics can be challenging to interpret in a straightforward manner. In order to synthetically assess economic performance across countries in Latin America we propose the use of a composite indicator, which builds upon the methodology of Khramov and Lee (2013) and incorporates key indicators from each of the pillars of macroeconomic statistics: the System of National Accounts, the Balance of Payments Statistics, Monetary and Financial Statistics and Public Finance Statistics. Through a composite examination of key statistical indicators in each country across their long-term trends, we can more fully understand the underlying macroeconomic dynamics.
Resumo:
Since 2008 we have supported the collaborative initiative "Economics of Climate Change in Central America" aimed at demonstrating the impacts of climate variability and change and fostering a discussion on public policies in key sectors. The initiative has been led by the Ministries of Environment and Treasury or Finance of Central America, with the support of their ministerial councils, CCAD, COSEFIN, and Economic Integration Secretariat, SIECA. The Ministries of Agriculture and of Health, with their councils, CAC and COMISCA, have also joined the effort; and the Dominican Republic came on board in 2015.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.