𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On the implementation of security policies with adaptative encryption

✍ Scribed by Antonio Izquierdo Manzanares; Jose M. Sierra Camara; Joaquin Torres Marquez


Book ID
108100576
Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
491 KB
Volume
29
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


On the security of image encryption meth
✍ Jan Jinn-Ke; Tseng Yuh-Min πŸ“‚ Article πŸ“… 1996 πŸ› Elsevier Science 🌐 English βš– 457 KB

Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique

Comments on the security of Chen’s authe
✍ Mohamed Rasslan; Amr Youssef πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 169 KB

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these