TITLE

A Brainy New Weapon Emerges to Protect Data

AUTHOR(S)
Adams, John
PUB. DATE
August 2005
SOURCE
Bank Technology News;Aug2005, Vol. 18 Issue 8, p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on quantum key distribution (QKD), an encryption system for data protection in the financial services industry in the U.S. Explanation of how QKD works; Benefits to users.
ACCESSION #
18623458

 

Related Articles

  • Financial firms share security plans. Messmer, Ellen // Network World;12/11/2006, Vol. 23 Issue 48, p10 

    The article focuses on the efforts of financial services companies to implement techniques to prevent and control customer data loss in the U.S. IT security managers of these companies admit that they are adopting new network defenses and organizational structures to lower the risk of a data...

  • Why a £75 outlay could have saved Nationwide £1,m. McKelvey, Charlie // Precision Marketing;2/23/2007, Vol. 19 Issue 9, p12 

    The article introduces encryption software as a solution to computer data leakage in Great Britain. The author claims that with the boom of computer technology, data thefts has been rampant , and needs action from the government. Due to information losses, some companies have experienced several...

  • Encryption: More than just complex algorithms. Cravotta, Nicholas // EDN;03/18/99, Vol. 44 Issue 6, p105 

    Evaluates the role of encryption technology in maintaining the general availability of information and controlling its use and abuse. Reduction of system vulnerabilities; Security issues; Encryption implementations. INSETS: `Randomness' is next to `secretness'.;Exporting encryption...

  • The n-Diffie-Hellman problem and multiple-key encryption. Chen, Liqun; Chen, Yu // International Journal of Information Security;Oct2012, Vol. 11 Issue 5, p305 

    The main contributions of this paper are twofold. On the one hand, the twin Diffie-Hellman (twin DH) problem proposed by Cash et al. is extended to the n-Diffie-Hellman ( n-DH) problem for an arbitrary integer n, and this new problem is shown to be at least as hard as the ordinary DH problem....

  • How an Encryption Formula Makes Email Secure.  // Bank Security Report;Oct2012, Vol. 41 Issue 10, p7 

    The article offers information on how the RSA encryption method works. The RSA algorithm consists of three steps including key generation, encryption and decryption. The math behind RSA public key encryption is explained. Steps to computing a public/key combination are discussed. The importance...

  • Losing the key. Brown, Andrew // New Statesman;11/8/99, Vol. 128 Issue 4461, p47 

    Focuses on the risks of computer data encryption. Computer crime of Phil Zimmerman; Foundation of the electronic commerce; Another version of the Turnpike software that Demon Internet will release.

  • New Chaotic Information Security Algorithms. Al-Najjar, Hazem; Al-Rousan, Nadia // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p32 

    In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each...

  • Analyzing the Efficiency of Text-to-Image Encryption Algorithm. Abusukhon, Ahmad; Talib, Mohammad; Nabulsi, Maher A. // International Journal of Advanced Computer Science & Application;Nov2012, Vol. 3 Issue 11, p35 

    Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous work we proposed the Text-to-Image Encryption algorithm (TTIE) as a novel algorithm for network security. In...

  • Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks. Xingming Sun; Jianwei Su; Baowei Wang; Qi Liu // International Journal of Security & Its Applications;Jul2013, Vol. 7 Issue 4, p407 

    Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. But in these applications, data integrity from sensors has not been verified. Thereby in this paper, we have proposed a novel data integrity protection strategy based on digital...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics