Key Management for Compressive Sensing based Cryptographic Mechanisms

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Ayemele Djeujo, Romeo (VerfasserIn)
Format: Abschlussarbeit Buch
Sprache:English
Veröffentlicht: Aachen Shaker Verlag 2018
Schriftenreihe:Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme 37
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000008cb4500
001 BV044791565
003 DE-604
005 20190121
007 t
008 180221s2018 gw a||| m||| 00||| eng d
016 7 |a 1149272007  |2 DE-101 
020 |a 9783844057249  |c : EUR 48.80 (DE), EUR 48.80 (AT), CHF 61.10 (freier Preis)  |9 978-3-8440-5724-9 
024 3 |a 9783844057249 
035 |a (OCoLC)1083297492 
035 |a (DE-599)DNB1149272007 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a gw  |c XA-DE-NW 
049 |a DE-83 
100 1 |a Ayemele Djeujo, Romeo  |e Verfasser  |4 aut 
245 1 0 |a Key Management for Compressive Sensing based Cryptographic Mechanisms  |c Romeo Ayemele Djeujo 
264 1 |a Aachen  |b Shaker Verlag  |c 2018 
300 |a xvi, 147 Seiten  |b Illustrationen, Diagramme  |c 21 cm x 14.8 cm, 245 g 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme  |v 37 
502 |b Dissertation  |c Universität Siegen  |d 2017 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Komprimierte Abtastung  |0 (DE-588)1036377245  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsanalyse  |0 (DE-588)4684292-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Matrixtransformation  |0 (DE-588)4572058-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
653 |a Compressed Sensing 
653 |a Cryptography 
653 |a IT-Security 
653 |a Key Management 
655 7 |0 (DE-588)4113937-9  |a Hochschulschrift  |2 gnd-content 
689 0 0 |a Komprimierte Abtastung  |0 (DE-588)1036377245  |D s 
689 0 1 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |D s 
689 0 2 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 4 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 0 5 |a Matrixtransformation  |0 (DE-588)4572058-7  |D s 
689 0 6 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 7 |a Sicherheitsanalyse  |0 (DE-588)4684292-5  |D s 
689 0 |5 DE-604 
810 2 |a Universität Siegen, Institut für Digitale Kommunikationssysteme  |t Forschungsberichte  |v 37  |w (DE-604)BV035420517  |9 37 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-030186764 

Datensatz im Suchindex

_version_ 1804178303222808576
adam_text CONTENTS 1 INTRODUCTION 1 1.1 B ACKGROUND........................................................................................ 1 1.2 MOTIVATION AND CHALLENGES ............................................................... 2 1.3 CONTRIBUTIONS AND OUTLINE OF THE D ISSERTATION .............................. 3 2 RELATED WORK 7 2.1 KEY MANAGEMENT IN CS-BASED CRYPTOGRAPHY ................................. 7 2.2 L IM ITATIO N S........................................................................................ 8 3 BASIC TECHNOLOGIES 11 3.1 COMPRESSIVE SENSING AND CRYPTOGRAPHY .......................................... 11 3.1.1 COMPRESSIVE SENSING ............................................................ 11 3.1.2 CRYPTOGRAPHY......................................................................... 16 3.2 COMPRESSIVE SENSING BASED CRYPTOGRAPHIC MECHANISMS ............... 23 3.2.1 COMPRESSIVE SENSING BASED ENCRYPTION .............................. 24 3.2.2 COMPRESSIVE SENSING BASED HASHING AND AUTHENTICATION . 26 3.3 FUNCTIONS FOR KEY GENERATION ............................................................ 26 3.3.1 KEY DERIVATION FUNCTION (KDF) ....................................... 26 3.3.2 FISHER-YATE SH U FFLE ............................................................... 31 3.3.3 CHOOSING A UNIFORMLY SAMPLED GROUP E LEM ENT ............... 32 4 SECRET MATRIX REQUIREMENTS ANALYSIS AND PROPERTIES DESCRIPTION 35 4.1 KEYS AND ASSOCIATED M ETADATA .......................................................... 35 4.1.1 PROPERTIES AND PARAMETERS OF THE SECRET COMPRESSIVE SEN SING (CS) M A TR IX .................................................................. 35 4.1.2 METADATA ASSOCIATED WITH THE SECRET CS M A TRIX ............... 37 4.2 PROTECTION REQUIREMENT FOR THE SECRET CS MATRIX AND ASSOCIATED M E T A D A TA ........................................................................................... 41 4.2.1 PROTECTION REQUIREMENTS FOR THE SECRET CS M A TRIX ............ 41 4.2.2 PROTECTION REQUIREMENTS FOR ASSOCIATED METADATA OR OTHER RELATED CRYPTOGRAPHIC INFORMATION .................................... 42 4.3 SESSION DESCRIPTION PROTOCOL (SDP) FOR SECRET CS MATRIX PARA METERS AND ASSOCIATED M ETADATA....................................................... 43 4.3.1 DESCRIPTION OF PARAMETERS AS DEFINED IN THE STANDARD IETF RFC 4566 ............................................................................... 43 4.3.2 DESCRIPTION OF PARAMETERS NEEDED FOR CS-RELATED PARAME TERS AND MECHANISMS NEG O TIATIO N ....................................... 45 4.3.3 SESSION DESCRIPTION OF CS-BASED SECURITY RELATED PARAMETERS 47 5 KEY MANAGEMENT ARCHITECTURE FOR CS BASED CRYPTOGRAPHIC MECHANISMS 53 5.1 SECRET MATRIX HIGH LEVEL MANAGEMENT ARCHITECTURE AND LIFECYCLE MANAGEMENT........................................................................................ 53 5.1.1 PRE-OPERATIONAL P H A S E .......................................................... 53 5.1.2 OPERATIONAL P H A S E ................................................................ 59 5.1.3 POST-OPERATIONAL P HASE.......................................................... 61 5.2 SECURITY CONSIDERATION...................................................................... 62 5.2.1 SECURITY OF THE PROPOSED SECRET MATRIX MANAGEMENT SYSTEM 62 5.2.2 SECURE ASSOCIATION BETWEEN THE SECRET CS-MATRIX, ITS ME TADATA, AND THEIR MANAGEMENT FUNCTIONS ............................. 63 6 SECRET CS-MATRIX GENERATION MECHANISMS 65 6.1 COMPRESSIVE SENSING PROPERTIES OF EQUIVALENT MATRICES ................. 65 6.1.1 MATRIX EQUIVALENCE AND P ROPERTIES .................................... 65 6.1.2 CS MATRICES UNDER EQUIVALENCE TRANSFORM ATIONS ............... 68 6.2 TRANSFORMATIONS OF CS-MATRICES....................................................... 69 6.2.1 DESIGN OF A CS MATRIX PROPRIETIES*S INVARIANT TRANSFORMATION 70 6.2.2 THE SIZE OF THE SET OF TRANSFORMATIONS T ........................... 72 6.3 SECURE GENERATION OF SECRET UNSTRUCTURED CS-M ATRICES ............... 76 6.4 USING THE SECRET MATRIX GENERATION MECHANISM WHILE PRESERVING MATRIX PROPERTIES............................................................................... 84 6.5 EMBEDDING CRYTOGRAPHICALLY SECURE MATRIX TRANSFORMATION IN STRUCTURED C S ..................................................................................... 87 6.6 ANALYSIS OF SECURITY AND PERFORM ANCES .......................................... 88 6.6.1 S ECU RITY .................................................................................. 88 6.6.2 PERFORMANCE ......................................................................... 93 7 EXPERIMENT RESULTS AND DISCUSSIONS 97 7.1 EXPERIMENTS........................................................................................ 97 7.2 EXPERIMENT RE S U LTS ............................................................................ 98 7.2.1 EXPERIMENT I: SENSING/ RECONSTRUCTION CAPABILITY USING $NS 99 7.2.2 EXPERIMENT II: SENSING/RECONSTRUCTION CAPABILITY USING THE PAIR {RP^CRVXPRVI PCV C~^X) IN AN ADAPTIVE S-POCS . . . 100 7.2.3 EXPERIMENT III: UNSTRUCTURED VS STRUCTURED CS USING THE PAIR (RP^CRVIP*]) PWLCCV]) IN AN ADAPTIVE S-POCS . . . 101 7.2.4 EXPERIMENT IV: THE EFFECT OF RANDOMLY GENERATED SECRET MATRIX TRANSFORMATION PAIR (N RV; N CV) ................................. 101 7.3 DISCUSSION............................................................................................. 102 8 OTHER SECRET CS-MATRIX MANAGEMENT FUNCTIONS 105 8.1 SECRET CS-MATRIX MANAGEMENT F U N C TIO N S.......................................105 8.2 SECRET CS-MATRIX GENERATION AND R E-DERIVATION .............................. 105 8.3 SECRET CS-MATRIX UPDATE AND MODE OF OPERATION ........................... 106 8.4 SECRET CS-MATRIX STORAGE .................................................................. 107 8.5 SECRET CS-MATRIX BACKUP..................................................................... 109 8.6 SECRET CS-MATRIX ARCHIVE..................................................................... 110 9 SUMMARY 111 9.1 SUMMARY OF R E S U LTS ........................................................................... I L L 9.2 FUTURE W O RK S....................................................................................... 114
any_adam_object 1
author Ayemele Djeujo, Romeo
author_facet Ayemele Djeujo, Romeo
author_role aut
author_sort Ayemele Djeujo, Romeo
author_variant d r a dr dra
building Verbundindex
bvnumber BV044791565
ctrlnum (OCoLC)1083297492
(DE-599)DNB1149272007
format Thesis
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02686nam a22006018cb4500</leader><controlfield tag="001">BV044791565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190121 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180221s2018 gw a||| m||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1149272007</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783844057249</subfield><subfield code="c">: EUR 48.80 (DE), EUR 48.80 (AT), CHF 61.10 (freier Preis)</subfield><subfield code="9">978-3-8440-5724-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783844057249</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083297492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1149272007</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ayemele Djeujo, Romeo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Key Management for Compressive Sensing based Cryptographic Mechanisms</subfield><subfield code="c">Romeo Ayemele Djeujo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Aachen</subfield><subfield code="b">Shaker Verlag</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 147 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">21 cm x 14.8 cm, 245 g</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme</subfield><subfield code="v">37</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Siegen</subfield><subfield code="d">2017</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Matrixtransformation</subfield><subfield code="0">(DE-588)4572058-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Compressed Sensing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key Management</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Matrixtransformation</subfield><subfield code="0">(DE-588)4572058-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Universität Siegen, Institut für Digitale Kommunikationssysteme</subfield><subfield code="t">Forschungsberichte</subfield><subfield code="v">37</subfield><subfield code="w">(DE-604)BV035420517</subfield><subfield code="9">37</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=030186764&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030186764</subfield></datafield></record></collection>
genre (DE-588)4113937-9 Hochschulschrift gnd-content
genre_facet Hochschulschrift
id DE-604.BV044791565
illustrated Illustrated
indexdate 2024-07-10T08:01:49Z
institution BVB
isbn 9783844057249
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030186764
oclc_num 1083297492
open_access_boolean
owner DE-83
owner_facet DE-83
physical xvi, 147 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 245 g
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Shaker Verlag
record_format marc
series2 Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme
spelling Ayemele Djeujo, Romeo Verfasser aut
Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo
Aachen Shaker Verlag 2018
xvi, 147 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 245 g
txt rdacontent
n rdamedia
nc rdacarrier
Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme 37
Dissertation Universität Siegen 2017
Authentifikation (DE-588)4330656-1 gnd rswk-swf
Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf
Komprimierte Abtastung (DE-588)1036377245 gnd rswk-swf
Sicherheitsanalyse (DE-588)4684292-5 gnd rswk-swf
Matrixtransformation (DE-588)4572058-7 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Chiffrierung (DE-588)4352893-4 gnd rswk-swf
Kryptologie (DE-588)4033329-2 gnd rswk-swf
Compressed Sensing
Cryptography
IT-Security
Key Management
(DE-588)4113937-9 Hochschulschrift gnd-content
Komprimierte Abtastung (DE-588)1036377245 s
Schlüsselverwaltung (DE-588)4625230-7 s
Chiffrierung (DE-588)4352893-4 s
Kryptologie (DE-588)4033329-2 s
Authentifikation (DE-588)4330656-1 s
Matrixtransformation (DE-588)4572058-7 s
Datensicherung (DE-588)4011144-1 s
Sicherheitsanalyse (DE-588)4684292-5 s
DE-604
Universität Siegen, Institut für Digitale Kommunikationssysteme Forschungsberichte 37 (DE-604)BV035420517 37
DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
spellingShingle Ayemele Djeujo, Romeo
Key Management for Compressive Sensing based Cryptographic Mechanisms
Authentifikation (DE-588)4330656-1 gnd
Schlüsselverwaltung (DE-588)4625230-7 gnd
Komprimierte Abtastung (DE-588)1036377245 gnd
Sicherheitsanalyse (DE-588)4684292-5 gnd
Matrixtransformation (DE-588)4572058-7 gnd
Datensicherung (DE-588)4011144-1 gnd
Chiffrierung (DE-588)4352893-4 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4330656-1
(DE-588)4625230-7
(DE-588)1036377245
(DE-588)4684292-5
(DE-588)4572058-7
(DE-588)4011144-1
(DE-588)4352893-4
(DE-588)4033329-2
(DE-588)4113937-9
title Key Management for Compressive Sensing based Cryptographic Mechanisms
title_auth Key Management for Compressive Sensing based Cryptographic Mechanisms
title_exact_search Key Management for Compressive Sensing based Cryptographic Mechanisms
title_full Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo
title_fullStr Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo
title_full_unstemmed Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo
title_short Key Management for Compressive Sensing based Cryptographic Mechanisms
title_sort key management for compressive sensing based cryptographic mechanisms
topic Authentifikation (DE-588)4330656-1 gnd
Schlüsselverwaltung (DE-588)4625230-7 gnd
Komprimierte Abtastung (DE-588)1036377245 gnd
Sicherheitsanalyse (DE-588)4684292-5 gnd
Matrixtransformation (DE-588)4572058-7 gnd
Datensicherung (DE-588)4011144-1 gnd
Chiffrierung (DE-588)4352893-4 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Authentifikation
Schlüsselverwaltung
Komprimierte Abtastung
Sicherheitsanalyse
Matrixtransformation
Datensicherung
Chiffrierung
Kryptologie
Hochschulschrift
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV035420517
work_keys_str_mv AT ayemeledjeujoromeo keymanagementforcompressivesensingbasedcryptographicmechanisms