Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 217 |
---|---|
container_issue | |
container_start_page | 213 |
container_title | |
container_volume | |
creator | Fanfara, P. Dankova, E. Dufala, M. |
description | Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys. |
doi_str_mv | 10.1109/SAMI.2012.6208959 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6208959</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6208959</ieee_id><sourcerecordid>6208959</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c05054c476f90e85cff3800889001919365b79b8b8770c9f871aa1a1ff2ee6d33</originalsourceid><addsrcrecordid>eNpFkFFLwzAUhSMiqHM_QHzJH2i9aZsmeRxD3WDig_N5pNnNGl3S0WRC_70dG3hfDpePc-AcQh4Z5IyBev6cvS_zAliR1wVIxdUVuWcVFwKYEur6_6nhlkxj_IbxBBRC8jvy8xX1DmlnqY6D95h6ZygG0w-H5LpA9X7X9S61PtLUjaDVwSBNLdKI5jiS4eSNGKJL7hfpVidNXThTpKbz_hic0aewB3Jj9T7i9KITsn59Wc8X2erjbTmfrTKnIGUGOPDKVKK2ClByY20pAaRUMHZgqqx5I1QjGzmWMspKwbRmmllbINbbspyQp3OsQ8TNoXde98Pmsk35B0YTWd4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fanfara, P. ; Dankova, E. ; Dufala, M.</creator><creatorcontrib>Fanfara, P. ; Dankova, E. ; Dufala, M.</creatorcontrib><description>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</description><identifier>ISBN: 1457701960</identifier><identifier>ISBN: 9781457701962</identifier><identifier>EISBN: 1457701979</identifier><identifier>EISBN: 1457701952</identifier><identifier>EISBN: 9781457701979</identifier><identifier>EISBN: 9781457701955</identifier><identifier>DOI: 10.1109/SAMI.2012.6208959</identifier><language>eng</language><publisher>IEEE</publisher><subject>Digital signatures ; Elliptic curve cryptography ; Encryption ; Generators</subject><ispartof>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), 2012, p.213-217</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6208959$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6208959$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fanfara, P.</creatorcontrib><creatorcontrib>Dankova, E.</creatorcontrib><creatorcontrib>Dufala, M.</creatorcontrib><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><title>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)</title><addtitle>SAMI</addtitle><description>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</description><subject>Digital signatures</subject><subject>Elliptic curve cryptography</subject><subject>Encryption</subject><subject>Generators</subject><isbn>1457701960</isbn><isbn>9781457701962</isbn><isbn>1457701979</isbn><isbn>1457701952</isbn><isbn>9781457701979</isbn><isbn>9781457701955</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkFFLwzAUhSMiqHM_QHzJH2i9aZsmeRxD3WDig_N5pNnNGl3S0WRC_70dG3hfDpePc-AcQh4Z5IyBev6cvS_zAliR1wVIxdUVuWcVFwKYEur6_6nhlkxj_IbxBBRC8jvy8xX1DmlnqY6D95h6ZygG0w-H5LpA9X7X9S61PtLUjaDVwSBNLdKI5jiS4eSNGKJL7hfpVidNXThTpKbz_hic0aewB3Jj9T7i9KITsn59Wc8X2erjbTmfrTKnIGUGOPDKVKK2ClByY20pAaRUMHZgqqx5I1QjGzmWMspKwbRmmllbINbbspyQp3OsQ8TNoXde98Pmsk35B0YTWd4</recordid><startdate>201201</startdate><enddate>201201</enddate><creator>Fanfara, P.</creator><creator>Dankova, E.</creator><creator>Dufala, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201201</creationdate><title>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</title><author>Fanfara, P. ; Dankova, E. ; Dufala, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c05054c476f90e85cff3800889001919365b79b8b8770c9f871aa1a1ff2ee6d33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Digital signatures</topic><topic>Elliptic curve cryptography</topic><topic>Encryption</topic><topic>Generators</topic><toplevel>online_resources</toplevel><creatorcontrib>Fanfara, P.</creatorcontrib><creatorcontrib>Dankova, E.</creatorcontrib><creatorcontrib>Dufala, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fanfara, P.</au><au>Dankova, E.</au><au>Dufala, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication</atitle><btitle>2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)</btitle><stitle>SAMI</stitle><date>2012-01</date><risdate>2012</risdate><spage>213</spage><epage>217</epage><pages>213-217</pages><isbn>1457701960</isbn><isbn>9781457701962</isbn><eisbn>1457701979</eisbn><eisbn>1457701952</eisbn><eisbn>9781457701979</eisbn><eisbn>9781457701955</eisbn><abstract>Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.</abstract><pub>IEEE</pub><doi>10.1109/SAMI.2012.6208959</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457701960 |
ispartof | 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), 2012, p.213-217 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6208959 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Digital signatures Elliptic curve cryptography Encryption Generators |
title | Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T00%3A31%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Usage%20of%20asymmetric%20encryption%20algorithms%20to%20enhance%20the%20security%20of%20sensitive%20data%20in%20secure%20communication&rft.btitle=2012%20IEEE%2010th%20International%20Symposium%20on%20Applied%20Machine%20Intelligence%20and%20Informatics%20(SAMI)&rft.au=Fanfara,%20P.&rft.date=2012-01&rft.spage=213&rft.epage=217&rft.pages=213-217&rft.isbn=1457701960&rft.isbn_list=9781457701962&rft_id=info:doi/10.1109/SAMI.2012.6208959&rft_dat=%3Cieee_6IE%3E6208959%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457701979&rft.eisbn_list=1457701952&rft.eisbn_list=9781457701979&rft.eisbn_list=9781457701955&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6208959&rfr_iscdi=true |