Key Management for Compressive Sensing based Cryptographic Mechanisms
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Aachen
Shaker Verlag
2018
|
Schriftenreihe: | Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme
37 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV044791565 | ||
003 | DE-604 | ||
005 | 20190121 | ||
007 | t | ||
008 | 180221s2018 gw a||| m||| 00||| eng d | ||
016 | 7 | |a 1149272007 |2 DE-101 | |
020 | |a 9783844057249 |c : EUR 48.80 (DE), EUR 48.80 (AT), CHF 61.10 (freier Preis) |9 978-3-8440-5724-9 | ||
024 | 3 | |a 9783844057249 | |
035 | |a (OCoLC)1083297492 | ||
035 | |a (DE-599)DNB1149272007 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-83 | ||
100 | 1 | |a Ayemele Djeujo, Romeo |e Verfasser |4 aut | |
245 | 1 | 0 | |a Key Management for Compressive Sensing based Cryptographic Mechanisms |c Romeo Ayemele Djeujo |
264 | 1 | |a Aachen |b Shaker Verlag |c 2018 | |
300 | |a xvi, 147 Seiten |b Illustrationen, Diagramme |c 21 cm x 14.8 cm, 245 g | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme |v 37 | |
502 | |b Dissertation |c Universität Siegen |d 2017 | ||
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Komprimierte Abtastung |0 (DE-588)1036377245 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Matrixtransformation |0 (DE-588)4572058-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | |a Compressed Sensing | ||
653 | |a Cryptography | ||
653 | |a IT-Security | ||
653 | |a Key Management | ||
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Komprimierte Abtastung |0 (DE-588)1036377245 |D s |
689 | 0 | 1 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 4 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 5 | |a Matrixtransformation |0 (DE-588)4572058-7 |D s |
689 | 0 | 6 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 7 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |D s |
689 | 0 | |5 DE-604 | |
810 | 2 | |a Universität Siegen, Institut für Digitale Kommunikationssysteme |t Forschungsberichte |v 37 |w (DE-604)BV035420517 |9 37 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030186764 |
Datensatz im Suchindex
_version_ | 1804178303222808576 |
---|---|
adam_text | CONTENTS
1 INTRODUCTION 1
1.1 B
ACKGROUND........................................................................................
1
1.2 MOTIVATION AND CHALLENGES
...............................................................
2
1.3 CONTRIBUTIONS AND OUTLINE OF THE D ISSERTATION
..............................
3
2 RELATED WORK 7
2.1 KEY MANAGEMENT IN CS-BASED CRYPTOGRAPHY
.................................
7
2.2 L IM ITATIO N
S........................................................................................
8
3 BASIC TECHNOLOGIES 11
3.1 COMPRESSIVE SENSING AND CRYPTOGRAPHY
..........................................
11
3.1.1 COMPRESSIVE SENSING
............................................................
11
3.1.2
CRYPTOGRAPHY.........................................................................
16
3.2 COMPRESSIVE SENSING BASED CRYPTOGRAPHIC MECHANISMS
...............
23
3.2.1 COMPRESSIVE SENSING BASED ENCRYPTION
..............................
24
3.2.2 COMPRESSIVE SENSING BASED HASHING AND AUTHENTICATION . 26
3.3 FUNCTIONS FOR KEY GENERATION
............................................................
26
3.3.1 KEY DERIVATION FUNCTION (KDF)
.......................................
26
3.3.2 FISHER-YATE SH U FFLE
...............................................................
31
3.3.3 CHOOSING A UNIFORMLY SAMPLED GROUP E LEM ENT
...............
32
4 SECRET MATRIX REQUIREMENTS ANALYSIS AND PROPERTIES DESCRIPTION 35
4.1 KEYS AND ASSOCIATED M ETADATA
..........................................................
35
4.1.1 PROPERTIES AND PARAMETERS OF THE SECRET COMPRESSIVE SEN
SING (CS) M A TR IX
..................................................................
35
4.1.2 METADATA ASSOCIATED WITH THE SECRET CS M A TRIX
...............
37
4.2 PROTECTION REQUIREMENT FOR THE SECRET CS MATRIX AND ASSOCIATED
M E T A D A TA
...........................................................................................
41
4.2.1 PROTECTION REQUIREMENTS FOR THE SECRET CS M A TRIX
............
41
4.2.2 PROTECTION REQUIREMENTS FOR ASSOCIATED METADATA OR OTHER
RELATED CRYPTOGRAPHIC INFORMATION
....................................
42
4.3 SESSION DESCRIPTION PROTOCOL (SDP) FOR SECRET CS MATRIX PARA
METERS AND ASSOCIATED M
ETADATA....................................................... 43
4.3.1 DESCRIPTION OF PARAMETERS AS DEFINED IN THE STANDARD IETF
RFC 4566
...............................................................................
43
4.3.2 DESCRIPTION OF PARAMETERS NEEDED FOR CS-RELATED PARAME
TERS AND MECHANISMS NEG O TIATIO N
.......................................
45
4.3.3 SESSION DESCRIPTION OF CS-BASED SECURITY RELATED PARAMETERS 47
5 KEY MANAGEMENT ARCHITECTURE FOR CS BASED CRYPTOGRAPHIC MECHANISMS 53
5.1 SECRET MATRIX HIGH LEVEL MANAGEMENT ARCHITECTURE AND LIFECYCLE
MANAGEMENT........................................................................................
53
5.1.1 PRE-OPERATIONAL P H A S E
.......................................................... 53
5.1.2 OPERATIONAL P H A S E
................................................................ 59
5.1.3 POST-OPERATIONAL P
HASE.......................................................... 61
5.2 SECURITY
CONSIDERATION......................................................................
62
5.2.1 SECURITY OF THE PROPOSED SECRET MATRIX MANAGEMENT SYSTEM 62
5.2.2 SECURE ASSOCIATION BETWEEN THE SECRET CS-MATRIX, ITS ME
TADATA, AND THEIR MANAGEMENT FUNCTIONS
.............................
63
6 SECRET CS-MATRIX GENERATION MECHANISMS 65
6.1 COMPRESSIVE SENSING PROPERTIES OF EQUIVALENT MATRICES
.................
65
6.1.1 MATRIX EQUIVALENCE AND P ROPERTIES
....................................
65
6.1.2 CS MATRICES UNDER EQUIVALENCE TRANSFORM ATIONS
...............
68
6.2 TRANSFORMATIONS OF
CS-MATRICES....................................................... 69
6.2.1 DESIGN OF A CS MATRIX PROPRIETIES*S INVARIANT TRANSFORMATION 70
6.2.2 THE SIZE OF THE SET OF TRANSFORMATIONS T
...........................
72
6.3 SECURE GENERATION OF SECRET UNSTRUCTURED CS-M ATRICES
...............
76
6.4 USING THE SECRET MATRIX GENERATION MECHANISM WHILE PRESERVING
MATRIX
PROPERTIES...............................................................................
84
6.5 EMBEDDING CRYTOGRAPHICALLY SECURE MATRIX TRANSFORMATION IN
STRUCTURED C S
.....................................................................................
87
6.6 ANALYSIS OF SECURITY AND PERFORM ANCES
..........................................
88
6.6.1 S ECU RITY
..................................................................................
88
6.6.2 PERFORMANCE
.........................................................................
93
7 EXPERIMENT RESULTS AND DISCUSSIONS 97
7.1
EXPERIMENTS........................................................................................
97
7.2 EXPERIMENT RE S U LTS
............................................................................
98
7.2.1 EXPERIMENT I: SENSING/ RECONSTRUCTION CAPABILITY USING $NS 99
7.2.2 EXPERIMENT II: SENSING/RECONSTRUCTION CAPABILITY USING THE
PAIR {RP^CRVXPRVI PCV C~^X) IN AN ADAPTIVE S-POCS . . . 100
7.2.3 EXPERIMENT III: UNSTRUCTURED VS STRUCTURED CS USING THE
PAIR (RP^CRVIP*]) PWLCCV]) IN AN ADAPTIVE S-POCS . . . 101
7.2.4 EXPERIMENT IV: THE EFFECT OF RANDOMLY GENERATED SECRET
MATRIX TRANSFORMATION PAIR (N RV; N CV)
.................................
101
7.3
DISCUSSION.............................................................................................
102
8 OTHER SECRET CS-MATRIX MANAGEMENT FUNCTIONS 105
8.1 SECRET CS-MATRIX MANAGEMENT F U N C TIO N
S.......................................105
8.2 SECRET CS-MATRIX GENERATION AND R E-DERIVATION
..............................
105
8.3 SECRET CS-MATRIX UPDATE AND MODE OF OPERATION
...........................
106
8.4 SECRET CS-MATRIX STORAGE
.................................................................. 107
8.5 SECRET CS-MATRIX
BACKUP.....................................................................
109
8.6 SECRET CS-MATRIX
ARCHIVE.....................................................................
110
9 SUMMARY 111
9.1 SUMMARY OF R E S U LTS
...........................................................................
I L L
9.2 FUTURE W O RK
S.......................................................................................
114
|
any_adam_object | 1 |
author | Ayemele Djeujo, Romeo |
author_facet | Ayemele Djeujo, Romeo |
author_role | aut |
author_sort | Ayemele Djeujo, Romeo |
author_variant | d r a dr dra |
building | Verbundindex |
bvnumber | BV044791565 |
ctrlnum | (OCoLC)1083297492 (DE-599)DNB1149272007 |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02686nam a22006018cb4500</leader><controlfield tag="001">BV044791565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190121 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180221s2018 gw a||| m||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1149272007</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783844057249</subfield><subfield code="c">: EUR 48.80 (DE), EUR 48.80 (AT), CHF 61.10 (freier Preis)</subfield><subfield code="9">978-3-8440-5724-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783844057249</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083297492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1149272007</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ayemele Djeujo, Romeo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Key Management for Compressive Sensing based Cryptographic Mechanisms</subfield><subfield code="c">Romeo Ayemele Djeujo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Aachen</subfield><subfield code="b">Shaker Verlag</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 147 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">21 cm x 14.8 cm, 245 g</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme</subfield><subfield code="v">37</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Siegen</subfield><subfield code="d">2017</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Matrixtransformation</subfield><subfield code="0">(DE-588)4572058-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Compressed Sensing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key Management</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Komprimierte Abtastung</subfield><subfield code="0">(DE-588)1036377245</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Matrixtransformation</subfield><subfield code="0">(DE-588)4572058-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Universität Siegen, Institut für Digitale Kommunikationssysteme</subfield><subfield code="t">Forschungsberichte</subfield><subfield code="v">37</subfield><subfield code="w">(DE-604)BV035420517</subfield><subfield code="9">37</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030186764</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV044791565 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:01:49Z |
institution | BVB |
isbn | 9783844057249 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030186764 |
oclc_num | 1083297492 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xvi, 147 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 245 g |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Shaker Verlag |
record_format | marc |
series2 | Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme |
spelling | Ayemele Djeujo, Romeo Verfasser aut Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo Aachen Shaker Verlag 2018 xvi, 147 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 245 g txt rdacontent n rdamedia nc rdacarrier Forschungsberichte / Universität Siegen, Institut für Digitale Kommunikationssysteme 37 Dissertation Universität Siegen 2017 Authentifikation (DE-588)4330656-1 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Komprimierte Abtastung (DE-588)1036377245 gnd rswk-swf Sicherheitsanalyse (DE-588)4684292-5 gnd rswk-swf Matrixtransformation (DE-588)4572058-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Compressed Sensing Cryptography IT-Security Key Management (DE-588)4113937-9 Hochschulschrift gnd-content Komprimierte Abtastung (DE-588)1036377245 s Schlüsselverwaltung (DE-588)4625230-7 s Chiffrierung (DE-588)4352893-4 s Kryptologie (DE-588)4033329-2 s Authentifikation (DE-588)4330656-1 s Matrixtransformation (DE-588)4572058-7 s Datensicherung (DE-588)4011144-1 s Sicherheitsanalyse (DE-588)4684292-5 s DE-604 Universität Siegen, Institut für Digitale Kommunikationssysteme Forschungsberichte 37 (DE-604)BV035420517 37 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ayemele Djeujo, Romeo Key Management for Compressive Sensing based Cryptographic Mechanisms Authentifikation (DE-588)4330656-1 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Komprimierte Abtastung (DE-588)1036377245 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Matrixtransformation (DE-588)4572058-7 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4625230-7 (DE-588)1036377245 (DE-588)4684292-5 (DE-588)4572058-7 (DE-588)4011144-1 (DE-588)4352893-4 (DE-588)4033329-2 (DE-588)4113937-9 |
title | Key Management for Compressive Sensing based Cryptographic Mechanisms |
title_auth | Key Management for Compressive Sensing based Cryptographic Mechanisms |
title_exact_search | Key Management for Compressive Sensing based Cryptographic Mechanisms |
title_full | Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo |
title_fullStr | Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo |
title_full_unstemmed | Key Management for Compressive Sensing based Cryptographic Mechanisms Romeo Ayemele Djeujo |
title_short | Key Management for Compressive Sensing based Cryptographic Mechanisms |
title_sort | key management for compressive sensing based cryptographic mechanisms |
topic | Authentifikation (DE-588)4330656-1 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Komprimierte Abtastung (DE-588)1036377245 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Matrixtransformation (DE-588)4572058-7 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Authentifikation Schlüsselverwaltung Komprimierte Abtastung Sicherheitsanalyse Matrixtransformation Datensicherung Chiffrierung Kryptologie Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030186764&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035420517 |
work_keys_str_mv | AT ayemeledjeujoromeo keymanagementforcompressivesensingbasedcryptographicmechanisms |