Encryption Systems
Mostrando 1-12 de 14 artigos, teses e dissertações.
-
1. Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space
ABSTRACT The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount of st
Braz. arch. biol. technol.. Publicado em: 25/06/2018
-
2. All-optical cryptography through spectral amplitude and delay encoding
All-optical data encryption is a promising technology that could lead communication systems to an unprecedented degree of security. In this paper we use computer simulations to systematically investigate a new all-optical cryptography technique that is bit-rate independent and transparent to modulation formats. Encryption encompasses signal spectral slicing
J. Microw. Optoelectron. Electromagn. Appl.. Publicado em: 2013-12
-
3. Optical cryptography through analog control of amplitude and delay of spectral slices: anlysis for NRZ and DQPSK signals. / Criptografia Ãptica mediante controle analÃgico da amplitude e do atraso de fatias espectrais: anÃlise para sinais NRZ e DQPSK.
This work investigates a technique to encrypt the optical signal for Transparent Optical Network, TON, in order to safeguard the confidentiality and guarantee the security of informations that are transmitted through the Telecommunications Network. The technique is assessed on the physical layer of the reference model for open systems interconnection, OSI, a
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 23/11/2012
-
4. EXPLORAÇÃO DE OPERADORES ARITMÉTICOS NA TRANSFORMADA RÁPIDA DE FOURIER / ARITHMETICS OPERATORS EXPLORATION IN FAST FOURIER TRANSFORM
The power consumption reduction in the fast Fourier transform (FFT) is important because applications in battery-powered embedded systems grows daily. Thus this work focuses on the application of techniques to reduce power in specific projects of FFT algorithms. The goal is to achieve an architectural exploration in the FFT core, the decimation in time butte
Publicado em: 2010
-
5. Implementação e análise de desempenho dos protocolos de criptografia neural e Diffie-Hellman em sistemas RFID utilizando uma plataforma embarcada
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID sy
Publicado em: 2009
-
6. Rede ZigBee gerenciada por sistema de monitoramento remoto utilizando TCP/IP e GPRS / ZigBee network managed by remote monitoring system using TCP/IP e GPRS
Este trabalho propõe a integração de técnicas de sensoriamento dinâmico, redes de dados sem fio e internet. A implementação dos nós da rede visa permitir o monitoramento de objetos que se movem tanto numa rede interna, limitada a uma edificação, quanto numa rede externa, através de coordenadas GPSs (Global Position Systems). A rede sem fio, que ut
Publicado em: 2009
-
7. Proposta de implementação de uma arquitetura para a Internet de nova geração / An implementation proposal of a next generation internet architecture
A concepção original da arquitetura da Internet foi baseada em uma rede fixa e confiável. Hoje em dia, a Internet se tornou dinâmica e vulnerável aos ataques de segurança. Também não era prevista a necessidade de integração de tecnologias heterogêneas nem de ambientes sem fio. A arquitetura atual apresenta uma série de barreiras técnicas para pr
Publicado em: 2007
-
8. AnÃlise e resultados experimentais de sistemas de distribuiÃÃo quÃntica de chaves usando fÃtons isolados e estados coerentes mesoscÃpicos. / Theorical analysis and experimental results of quantum key distribution systems using single-photons and mesoscopic coherent states
In this dissertation it is realized a study about quantum key distribution (QKD) in optical networks. Initially, a review of the theory of quantum key distribution and some of its implementations with strongly attenuated coherent states, as well a review of an optical system for physical encryptation using mesoscopic coherent states are realized. Following,
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 13/09/2006
-
9. Um Novo Método de Geração de Sinais Complexos / A new method for wave form generation
In this work new applications in digital systems, encryption systems, data transmission, etc., through a new mathematical approach are described. This work presents some new important DNAx technique contributions to mathematics, physics and engineering fields. First of all the DNAx equations are defined and applied to definition of Delta of Dirac function, U
Publicado em: 2006
-
10. Um Novo Método de Geração de Sinais Complexos / A New Method for Wave Form Generation
Aplicações em sistemas digitais, encriptação, sistemas pulsados, compressão de dados, etc., são tratados nesta dissertação de maneira simplificada e inovadora. Este trabalho apresenta algumas contribuições importantes da técnica DNAx aos campos da matemática, física e engenharia. Primeiramente definimos as equações DNAx e as aplicamos nas defi
Publicado em: 2006
-
11. CriptoanÃlise Diferencial
Since the creation of the standard of encryption of data DES (Data Encryption Standard) in 1978, iterative ciphers of based private key in nets of Feistel have been constructed, aiming at to increase the security of the information stored and transmitted in unsafe environments of communications. Such ciphers, besides in general presenting one high level of r
Publicado em: 2003
-
12. A cryptologic based trust center for medical images.
OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive a