Sharp Security

February 2003
Management Services;Feb2003, Vol. 47 Issue 2, p29
Academic Journal
Sharp has introduced a data security kit which uses 128-bit encryption technology, making retrieval by unauthorized personnel almost impossible from the AR-M350, AR-M450, AR-P350 and AR-P450 range of modular multifunctional and printer products. Sharp has a history of developing security solutions, and has already completed the Common Criteria EAL2 evaluation for the data security kit launched for use with its AR-337, AR-407 and AR-507 copier printers.


Related Articles

  • ENCRYPT IT. Preston, W. Curtis // Information Security;Feb2007, Vol. 10 Issue 2, p32 

    The article discusses the process of encryption. This is a method that will help avoid personal data mishaps in the industry. In encrypting backup tapes, consider the risks of encrypting sorted data. One of the risks with encrypting backup tapes is failure to strike a balance between security...

  • Award recognises US professor's contribution to cyber security. Goodwin, Bill // Computer Weekly;3/15/2005, p42 

    The article reports that the International Information Systems Security Certification Consortium, (ISC)2, has presented Dorothy Denning, one of the world's leading information security experts, with an award for her contribution to cyber security and encryption. Denning, who has advised...

  • A Montgomery Representation of Elements in GF(25) for Efficient Arithmetic to Use in Elliptic Curve Cryptography. Rishivarman, A. R.; Parthasarathy, B.; Thiagarajan, M. // International Journal of Advanced Networking & Applications;Mar/Apr2010, Vol. 1 Issue 5, p323 

    Elliptic curve calculation was not introduced to cryptography until 1985. Compared with RSA, the advantage of elliptic curve cryptography lies in its ensuring the same security while the length of key of elliptic curve cryptography is much less than RSA cryptography and its lessening operation...

  • Private Searching on Streaming Data. Ostrovsky, Rafail; Skeith, William E. // Journal of Cryptology;Autumn2007, Vol. 20 Issue 4, p397 

    In this paper we consider the problem of private searching on streaming data, where we can efficiently implement searching for documents that satisfy a secret criteria (such as the presence or absence of a hidden combination of hidden keywords) under various cryptographic assumptions. Our...

  • High Security Image Steganography with Modified Arnold's Cat Map. Mishra, Minati; Routray, Ashanta Ranjan; Kumar, Sunit // International Journal of Computer Applications;Jan2012, Vol. 37, p16 

    Information security is concerned with maintaining the secrecy, reliability and accessibility of data. The main objective of information security is to protect information and information system from unauthorized access, revelation, disruption, alteration, annihilation and use. This paper uses...

  • Visualization in Information Security. Schweitzer, Dino; Fulton, Steven // Proceedings of the International Conference on Information Warfa;2012, p288 

    Information security is a data-rich discipline. Security analysts can be overwhelmed with the amount of data available, whether it is network traffic, audit logs, or IDS alarms. Security monitoring applications need to quickly process this data as they require rapid responses to real-time...

  • THE COMMON CRITERIA AND INFORMATION SYSTEMS SECURITY CERTIFICATION. Kokkinos, Nikolaos C.; Maditinos, Dimitrios I.; Šević, Željko; Stojanovic, Aleksandar // Journal of Business Management;2012, Issue 5, p161 

    Information security is a vital business requirement in today's information systems (IS). Last decades, the prospect of information technology security evaluation became a great worldwide challenge for many national institutes, agencies and schemes. Eventually, on the road to international...

  • Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme. Tunga, Harinandan; Mukherjee, Soumen // International Journal of Computer Science Issues (IJCSI);May2012, Vol. 9 Issue 3, p182 

    The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret...

  • Banking Security using Honeypot. Chaware, Sandeep // International Journal of Security & Its Applications;Jan2011, Vol. 5 Issue 1, p31 

    New threats are constantly emerging to the security of organization's information systems infrastructure. Firewall and VPN cannot prevent all intrusions and do little to prevent attacks from within the organization itself. Intrusion detection plays a vital role in ensuring the integrity of a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics