Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication

Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Fanfara, P., Dankova, E., Dufala, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 217
container_issue
container_start_page 213
container_title
container_volume
creator Fanfara, P.
Dankova, E.
Dufala, M.
description Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.
doi_str_mv 10.1109/SAMI.2012.6208959
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6208959</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6208959</ieee_id><sourcerecordid>6208959</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c05054c476f90e85cff3800889001919365b79b8b8770c9f871aa1a1ff2ee6d33</originalsourceid><addsrcrecordid>eNpFkFFLwzAUhSMiqHM_QHzJH2i9aZsmeRxD3WDig_N5pNnNGl3S0WRC_70dG3hfDpePc-AcQh4Z5IyBev6cvS_zAliR1wVIxdUVuWcVFwKYEur6_6nhlkxj_IbxBBRC8jvy8xX1DmlnqY6D95h6ZygG0w-H5LpA9X7X9S61PtLUjaDVwSBNLdKI5jiS4eSNGKJL7hfpVidNXThTpKbz_hic0aewB3Jj9T7i9KITsn59Wc8X2erjbTmfrTKnIGUGOPDKVKK2ClByY20pAaRUMHZgqqx5I1QjGzmWMspKwbRmmllbINbbspyQp3OsQ8TNoXde98Pmsk35B0YTWd4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fanfara, P. ; Dankova, E. ; Dufala, M.</creator><creatorcontrib>Fanfara, P. ; Dankova, E. ; Dufala, M.</creatorcontrib><description>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</description><identifier>ISBN: 1457701960</identifier><identifier>ISBN: 9781457701962</identifier><identifier>EISBN: 1457701979</identifier><identifier>EISBN: 1457701952</identifier><identifier>EISBN: 9781457701979</identifier><identifier>EISBN: 9781457701955</identifier><identifier>DOI: 10.1109/SAMI.2012.6208959</identifier><language>eng</language><publisher>IEEE</publisher><subject>Digital signatures ; Elliptic curve cryptography ; Encryption ; Generators</subject><ispartof>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), 2012, p.213-217</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6208959$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6208959$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fanfara, P.</creatorcontrib><creatorcontrib>Dankova, E.</creatorcontrib><creatorcontrib>Dufala, M.</creatorcontrib><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><title>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)</title><addtitle>SAMI</addtitle><description>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</description><subject>Digital signatures</subject><subject>Elliptic curve cryptography</subject><subject>Encryption</subject><subject>Generators</subject><isbn>1457701960</isbn><isbn>9781457701962</isbn><isbn>1457701979</isbn><isbn>1457701952</isbn><isbn>9781457701979</isbn><isbn>9781457701955</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkFFLwzAUhSMiqHM_QHzJH2i9aZsmeRxD3WDig_N5pNnNGl3S0WRC_70dG3hfDpePc-AcQh4Z5IyBev6cvS_zAliR1wVIxdUVuWcVFwKYEur6_6nhlkxj_IbxBBRC8jvy8xX1DmlnqY6D95h6ZygG0w-H5LpA9X7X9S61PtLUjaDVwSBNLdKI5jiS4eSNGKJL7hfpVidNXThTpKbz_hic0aewB3Jj9T7i9KITsn59Wc8X2erjbTmfrTKnIGUGOPDKVKK2ClByY20pAaRUMHZgqqx5I1QjGzmWMspKwbRmmllbINbbspyQp3OsQ8TNoXde98Pmsk35B0YTWd4</recordid><startdate>201201</startdate><enddate>201201</enddate><creator>Fanfara, P.</creator><creator>Dankova, E.</creator><creator>Dufala, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201201</creationdate><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><author>Fanfara, P. ; Dankova, E. ; Dufala, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c05054c476f90e85cff3800889001919365b79b8b8770c9f871aa1a1ff2ee6d33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Digital signatures</topic><topic>Elliptic curve cryptography</topic><topic>Encryption</topic><topic>Generators</topic><toplevel>online_resources</toplevel><creatorcontrib>Fanfara, P.</creatorcontrib><creatorcontrib>Dankova, E.</creatorcontrib><creatorcontrib>Dufala, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fanfara, P.</au><au>Dankova, E.</au><au>Dufala, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</atitle><btitle>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)</btitle><stitle>SAMI</stitle><date>2012-01</date><risdate>2012</risdate><spage>213</spage><epage>217</epage><pages>213-217</pages><isbn>1457701960</isbn><isbn>9781457701962</isbn><eisbn>1457701979</eisbn><eisbn>1457701952</eisbn><eisbn>9781457701979</eisbn><eisbn>9781457701955</eisbn><abstract>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</abstract><pub>IEEE</pub><doi>10.1109/SAMI.2012.6208959</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1457701960
ispartof 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), 2012, p.213-217
issn
language eng
recordid cdi_ieee_primary_6208959
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Digital signatures
Elliptic curve cryptography
Encryption
Generators
title Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T00%3A31%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Usage%20of%20asymmetric%20encryption%20algorithms%20to%20enhance%20the%20security%20of%20sensitive%20data%20in%20secure%20communication&rft.btitle=2012%20IEEE%2010th%20International%20Symposium%20on%20Applied%20Machine%20Intelligence%20and%20Informatics%20(SAMI)&rft.au=Fanfara,%20P.&rft.date=2012-01&rft.spage=213&rft.epage=217&rft.pages=213-217&rft.isbn=1457701960&rft.isbn_list=9781457701962&rft_id=info:doi/10.1109/SAMI.2012.6208959&rft_dat=%3Cieee_6IE%3E6208959%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457701979&rft.eisbn_list=1457701952&rft.eisbn_list=9781457701979&rft.eisbn_list=9781457701955&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6208959&rfr_iscdi=true