TITLE

The Tambourine (Algo)rhythm

AUTHOR(S)
Keggler, Johnny
PUB. DATE
August 2009
SOURCE
Armada International;Aug/Sep2009, Vol. 33 Issue 4, p50
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the efforts exerted and products and systems produced to prevent hacking and cyber attacks. It traces the development of cryptographic protection for data and information and the subsequent adoption of the Advanced Encryption Standard in 2001. It cites the accomplishments in integrated cyber security of Lockheed Martin and Raytheon in 2008-2009 and the breatkthrough discovery in May 2009 by an Austrian physicist of the encryption method which allows messages to be encrypted and bounced off satellites.
ACCESSION #
43678716

 

Related Articles

  • PROTECTION OF PERSONAL ACCOUNTS IN THE INTERNET. D. V., Shibaev // In the World of Scientific Discoveries / V Mire Nauchnykh Otkryt;2014, Vol. 58 Issue 10, p206 

    The article considers the ways of hacking and selecting passwords as well as how to design passwords of high degree of privacy and how to verify them. The soaring rates of hacking activities determine the significance of the paper in question and contemporary knowledge necessary to protect...

  • EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET. Rahbari, Mina; Jamali, Mohammad Ali Jabreil // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p185 

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain...

  • PREVENTING COMPUTER FRAUD. Hanna, Greg // Strategic Finance;Mar2005, Vol. 86 Issue 9, p31 

    The article discusses ways of preventing computer fraud. Research indicates that 75% of computer crimes are committed within an organization. Among the security measures experts recommend are firewalls, vulnerability-scanning tools, and an aunthentication of user names and passwords....

  • Multiple watermarking for text documents: a review. Jaiswal, Raj J.; Patil, Nitin N. // World Journal of Science & Technology;2012, Vol. 2 Issue 3, p176 

    For digital protection there are many methods, out of which text watermarking scheme is one of themost effective method. However, directly applying text watermarking to image and text documents will detract the invisiblility and robustness of embedded watermarks. These problem can be resolve by...

  • An algorithm of file encryption based on sum function sequences. Zhou Lei; Lu Hai-Lian; Sun Yu-Qiang; Gu Yu-Wan // Journal of Communication & Computer;Jan2008, Vol. 5 Issue 1, p48 

    An algorithm of file encryption based on sum function sequences is discussed in this paper. A file is encrypted by applying sum function sequences, bits with exclusive-or operation, and circular cryptographic key. Comparing with traditional algorithms and others, it is harder to decode, and the...

  • New Mersenne Number Transform Diffusion Power Analysis. Al-Gailani, M. F.; Boussakta, S. // American Journal of Engineering & Applied Sciences;2011, Vol. 4 Issue 4, p461 

    The article presents a study on the development of encryption algorithms with high data security levels which can work on various platforms. The authors examine the appropriateness of the New Mersenne Number for security applications through an analysis of its avalanche and diffusion power. They...

  • Improving a New Logistic Map as a New Chaotic Algorithm for Image Encryption. Saraereh, Omar A.; Alsafasfeh, Qais; Arfoa, Aodeh // Modern Applied Science;Dec2013, Vol. 7 Issue 12, p24 

    Image encryption is not a new field, but the techniques used to encrypt images are constantly being re-evaluated. As computer processing power grows, the need for better encryption algorithms grows with it. In this paper, the attention was focused on the encryption of still images. In...

  • Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model. Yanli Ren; Dawu Gu // Informatica (03505596);Aug2008, Vol. 32 Issue 3, p207 

    Constructing identity based schemes is one of the hot topics of current cryptography. Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating...

  • Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation. Yang Li; Jianming Zhu; Xiuli Wang; Yanmei Chai; Shuai Shao // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p385 

    In this work, we design a method for efficient revocation within Ciphertext-Policy Attribute-Based Encryption scheme. Our main technical innovation is based on linear secret sharing and binary tree techniques, every user in system is assigned with both a set of attributes and a unique...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics