TITLE

Getting on board the internet with EDI

AUTHOR(S)
Botts, Steve
PUB. DATE
December 1996
SOURCE
SISAC News;Winter96/Spring97, Vol. 11 Issue 2, p18
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on an article reprinted from EDI World, August 1996 issue. How the growth of the Internet heralds the beginning of a wave of open communications connectivity; The concerns about securing data on the Internet; The importance of knowing about cryptography; A digitally-signed message; A digitally-signed receipt; Benefits.
ACCESSION #
9710150012

 

Related Articles

  • Researchers find new way to hide messages in VoIP.  // Network World;11/21/2011, Vol. 28 Issue 21, p6 

    The article reports on the method known as transcoding steganography or TranSteg which sets a larger-then-necessary payload space in voice over Internet protocol (VoIP) packets and utilizes the extra room to carry covert messages.

  • NOVEL ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHMS FOR FASTER AND SAFER PUBLIC-KEY CRYPTOSYSTEMS. Iyengar, Vinay S. // International Journal on Cryptography & Information Security;Sep2012, Vol. 2 Issue 3, p57 

    Efficient and secure public-key cryptosystems are essential in today's age of rapidly growing Internet communications. Elliptic curve scalar multiplication in particular, which refers to the operation of multiplying a large integer by a point on an elliptic curve, is crucial for both data...

  • A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method. Bhattacharyya, Souvik; Sanyal, Gautam // International Journal of Electrical & Computer Engineering;2010, Vol. 5 Issue 2, p78 

    Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques....

  • Steganography?  // Scientific Computing & Instrumentation;Jul2002, Vol. 19 Issue 8, p12 

    Focuses on the applications of steganography on computer sound and graphic files. Difference between steganography and cryptography; List of steganography programs available on the Internet; Involvement of steganography in terrorism.

  • When Terror Hides Online. Cohen, Adam // Time;11/12/2001, Vol. 158 Issue 21, p65 

    Discusses the theory that the al-Qaeda terrorist network sends messages on the Internet using steganography. Details of steganography, which allows messages to be hidden in pictures and music files; Low cost of the technique; Idea that Osama bin Laden's followers could be hiding messages in...

  • When Terror Hides Online. Cohen, Adam // Time International (South Pacific Edition);11/12/2001, Issue 45, p47 

    Discusses the theory that the al-Qaeda terrorist network sends messages on the Internet using steganography. Details of steganography, which allows messages to be hidden in pictures and music files; Low cost of the technique; Idea that Osama bin Laden's followers could be hiding messages in...

  • Steganography Based on Payload Transformation. Shiva Kumar, K B; Raja, K B; Chhotaray, R K; Pattnaik, Sabyasachi // International Journal of Computer Science Issues (IJCSI);Mar2011, Vol. 8 Issue 2, p241 

    Steganography is meant for covert communication of confidential data through internet. In this paper, we propose Steganography based on Payload Transformation (SPT) which is non LSB and non transform domain technique where the cover image is segmented into 2*2 matrices and the matrix for payload...

  • Internet Fraud. Garceau, Linda R. // Ohio CPA Journal;Jul-Sep2000, Vol. 59 Issue 3, p50 

    Deals with the threat posed by Internet fraud to the business-to-consumer (B2C) industry. Predicted Internet B2C sales by 2004; Information on the basics of data encryption; Limitations of private key encryption; Public key or asymmetric key encryption systems employed in the encryption process.

  • Virtual microscopy and public-key cryptography for Internet telepathology. Strauss, J. S.; Felten, C. L.; Okada, D. H.; Marchevsky, A. M. // Journal of Telemedicine & Telecare;Jun1999, Vol. 5 Issue 2, p105 

    The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics