Cryptanalysis of a computer cryptography scheme based on a filter bank
FREE-DOWNLOAD D Arroyo, C Li, S Li… – Chaos, Solitons and Fractals, 2009 The application of chaotic systems to cryptographical issues has been a very important research topic since the 1990s . This interest was motivated by the close similarities between some properties of chaotic systems and some characteristics of well-designed
Colour visual cryptography schemes
FREE-DOWNLOADF Liu, CK Wu… – Information Security, IET, 2008 – Abstract: Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the
Strengthen cloud computing security with federal identity management using hierarchical identity-basedcryptography
FREE-DOWNLOAD L Yan, C Rong… – Cloud Computing, Abstract. More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their