664 resultados para RSA encryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Description based on: Vol. 43 (Nov. 23, 1894)=No. 2192

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Title from caption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tidigare har den vanligaste typen av reklam varit den i form av avbrott i tv­sändningar men i takt med våra ändrade tv­vanor söker reklamföretagen nya sätt att marknadsföra sig själva på. Så kallade produktplaceringar, är ett sådant marknadsföringssätt. Ett av de tydligaste exempel på detta är år 1982 då filmen E.T: The Extra Terrestrial hade premiär och huvudkaraktären åt godiset Reeses Pieces, en produktplacering som medförde en försäljningsökning på hela 65%. Produktplaceringar är sedan dess en blomstrande bransch och drar årligen in mångmiljardbelopp men attityderna gentemot denna typ av reklam har sviktat. Vi ställde oss därför frågan hur attityderna gentemot reklamfenomenet ser ut idag samt ifall ålder är en avgörande faktor för hur individer resonerar om produktplaceringar. Detta har lett till denna studiens syfte som är att undersöka två generationers attityder gentemot produktplaceringar i film och tv­serier samt hur de uppmärksammar det. Eftersom syftet med studien är att erhålla information om individers personliga uppfattningar, ansåg vi att den kvalitativa intervjun var bäst lämpad. Fyra intervjuer med personer mellan 20­30 år samt fyra intervjuer med personer mellan 50­60 år genomfördes. Materialet bestod i slutändan av åtta transkriberade intervjuer som analyserades med hjälp av studiens teoretiska ramverk. Teorierna berör generella antaganden om produktplaceringar, olika typer av produktplaceringar, dess påverkan på publiken, övertalningsförsök samt attityd och perception. Studien resulterade i att vi fann skillnader i hur generationerna uppmärksammar produktplaceringar. Den yngre generationen är i högre grad mottaglig för subtila placeringar medan den äldre generationen ansåg att placeringarna behövde vara tydliga och inzoomade för att uppmärksammas. Gällande attitydsaspekten fann vi att den yngre generationen har en något mer negativ inställning mot produktplaceringar, vilket kan bero på att denna typ av reklam påverkar det undermedvetna, något som framförallt den yngre generationen anser vara läskigt. Den äldre generationen har en något mer positiv syn på produktplaceringar, men en viss skepcism består. Detta beror troligen på att reklamtypen faktiskt påverkar och bringar ett köpintresse, något som denna generation hade skilda åsikter kring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using the work and ideas of French theorist Michel Foucault the writer examines s 3LA of the Crimes Act, which provides law enforcement officers with power to compel a person to reveal their private encryption keys and other personal information, and concludes that such a section creates fear, redirects flow of power between law enforcement agencies and citizens, and creates resistance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a DES/3DES core that will support cipher block chaining (CBC) and also has a built in keygen that together take up about 10% of the resources in a Xilinx Virtex II 1000-4. The core will achieve up to 200Mbit/s of encryption or decryption. Also presented is a network architecture that will allow these CBC capable 3DES cores to perform their processing in parallel.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the last several years, mobile devices and platform security threats, including wireless networking technology, have been top security issues. A departure has occurred from automatic anti-virus software based on traditional PC defense: risk management (authentication and encryption), compliance, and disaster recovery following polymorphic viruses and malware as the primary activities within many organizations and government services alike. This chapter covers research in Turkey as a reflection of the current market – e-government started officially in 2008. This situation in an emerging country presents the current situation and resistances encountered while engaging with mobile and e-government interfaces. The authors contend that research is needed to understand more precisely security threats and most of all potential solutions for sustainable future intention to use m-government services. Finally, beyond m-government initiatives' success or failure, the mechanisms related to public administration mobile technical capacity building and security issues are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A property of sparse representations in relation to their capacity for information storage is discussed. It is shown that this feature can be used for an application that we term Encrypted Image Folding. The proposed procedure is realizable through any suitable transformation. In particular, in this paper we illustrate the approach by recourse to the Discrete Cosine Transform and a combination of redundant Cosine and Dirac dictionaries. The main advantage of the proposed technique is that both storage and encryption can be achieved simultaneously using simple processing steps.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The statistical distribution, when determined from an incomplete set of constraints, is shown to be suitable as host for encrypted information. We design an encoding/decoding scheme to embed such a distribution with hidden information. The encryption security is based on the extreme instability of the encoding procedure. The essential feature of the proposed system lies in the fact that the key for retrieving the code is generated by random perturbations of very small value. The security of the proposed encryption relies on the security to interchange the secret key. Hence, it appears as a good complement to the quantum key distribution protocol. © 2005 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article we discuss a possibility to use genetic algorithms in cryptanalysis. We developed and described the genetic algorithm for finding the secret key of a block permutation cipher. In this case key is a permutation of some first natural numbers. Our algorithm finds the exact key’s length and the key with controlled accuracy. Evaluation of conducted experiment’s results shows that the almost automatic cryptanalysis is possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have been investigating the cryptographical properties of in nite families of simple graphs of large girth with the special colouring of vertices during the last 10 years. Such families can be used for the development of cryptographical algorithms (on symmetric or public key modes) and turbocodes in error correction theory. Only few families of simple graphs of large unbounded girth and arbitrarily large degree are known. The paper is devoted to the more general theory of directed graphs of large girth and their cryptographical applications. It contains new explicit algebraic constructions of in finite families of such graphs. We show that they can be used for the implementation of secure and very fast symmetric encryption algorithms. The symbolic computations technique allow us to create a public key mode for the encryption scheme based on algebraic graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Some basic types of archiving programs are described in the paper in addition to their advantages and disadvantages with respect to the analysis of security in archiving. Analysis and appraisal are performed on the results obtained during the described experiments.