Data Encryption
Mostrando 1-12 de 25 artigos, teses e dissertações.
-
1. Competência em informação para comunidades: empoderamento e protagonismo social
Resumo Apresenta resultado de pesquisa, que objetivou desenvolver competências em informação em moradores da Comunidade Santa Clara, em João Pessoa, por meio de estratégias de mediação, agindo com base no diálogo e na alteridade. Para tal, implementou-se uma ação de informação concretizada através de um projeto de capacitação denominado prepar
Perspect. ciênc. inf.. Publicado em: 16/05/2019
-
2. Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space
ABSTRACT The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount of st
Braz. arch. biol. technol.. Publicado em: 25/06/2018
-
3. All-optical cryptography through spectral amplitude and delay encoding
All-optical data encryption is a promising technology that could lead communication systems to an unprecedented degree of security. In this paper we use computer simulations to systematically investigate a new all-optical cryptography technique that is bit-rate independent and transparent to modulation formats. Encryption encompasses signal spectral slicing
J. Microw. Optoelectron. Electromagn. Appl.. Publicado em: 2013-12
-
4. Processo de formação de estratégias de marketing na hotelaria paraibana
This paper aims to analyze the marketing strategies formation process in hotels, located in the city of João Pessoa. The strategy making process seeks to understand how they are formulated within the organizations, as well as changes occur throughout this process. To understand the strategies formation process, was used as a methodological procedure qualita
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 30/08/2011
-
5. Consulta a base de dados cifrada em computação nas nuvens
With the dissemination and popularization of the Internet, more and more people and businesses are using cloud computing services. Among these services, there is a storage and hosting of databases in the clouds. In this context a problem arises, how to ensure the privacy and integrity of databases that are exposed to attacks. The goal of this dissertation is
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 08/08/2011
-
6. Algoritmos de autenticação de mensagens para redes de sensores. / Message authentication algorithms for wireless sensor networks.
Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This
Publicado em: 2010
-
7. EXPLORAÇÃO DE OPERADORES ARITMÉTICOS NA TRANSFORMADA RÁPIDA DE FOURIER / ARITHMETICS OPERATORS EXPLORATION IN FAST FOURIER TRANSFORM
The power consumption reduction in the fast Fourier transform (FFT) is important because applications in battery-powered embedded systems grows daily. Thus this work focuses on the application of techniques to reduce power in specific projects of FFT algorithms. The goal is to achieve an architectural exploration in the FFT core, the decimation in time butte
Publicado em: 2010
-
8. Identity-based cryptography environment. / Um ambiente criptográfico baseado na identidade.
The accelerated growth of Internet-based business increase significantly the need for mechanisms that can guarantee the data confidentiality, providing tools for authenticity and non-repudiation users in any medium of communication, even with computer resources becoming increasingly scarce, eg into a cell phone. This paper describes an encryption scheme that
Publicado em: 2008
-
9. Em busca de um algoritmo construtivo para autômatos celulares reversíveis: a abordagem das regras primitivas e derivadas
Cellular automata have been studied as computer models in many different areas. They have many properties, one of them being reversibility. Reversible cellular automata can be used, among other applications, for data compressing and encryption. Apparently, the reversible rules featured in the literature seem to have been derived through exhaustive searches i
Publicado em: 2008
-
10. Análise de segurança de esquemas de privacidade de dados
This dissertation walks through the Advantage Function Model, from Goldwasser and Bellare, explaining its complex concepts and exemplifying its application in the analysis of encryption security schemes currently used in practice. It is also shown ways to put this model into practice. The safety of the schemes used in the IEEE 802.11 Standard are explained a
Publicado em: 2007
-
11. AnÃlise de seguranÃa de esquemas de privacidade de dados
This dissertation walks through the Advantage Function Model, from Goldwasser and Bellare, explaining its complex concepts and exemplifying its application in the analysis of encryption security schemes currently used in practice. It is also shown ways to put this model into practice. The safety of the schemes used in the IEEE 802.11 Standard are explained a
Publicado em: 2007
-
12. DHA :um esquema de acordo de chaves baseado em matrizes para o protocolo Diffie-Hellman
In this work is proposed an annonimous cryptographic key agreement protocol by secure way based on Diffe-Hellman protocol. Actually key agreement protocols like Diffe-Hellman, ElGamal and other work with modular exponentiation operations and the complexity of such protocols are based on apparent diffcult to deal DLP (Discrete Logarithm Problems). The propose
Publicado em: 2007