Journal ArticleDOI
Placement of data integrity security services in open systems interconnection architecture
TLDR
Considering various data integrity services and mechanisms and presenting some factors for the selection of suitable layers for the placement of data integrity security services in the emerging open systems interconnection (OSI) seven-layer reference model architecture is presented.About:
This article is published in Computers & Security.The article was published on 1989-09-01. It has received 5 citations till now. The article focuses on the topics: Data integrity & Data security.read more
Citations
More filters
Proceedings ArticleDOI
Decryption of noisy encrypted images by statistical analysis
Naveed Islam,William Puech +1 more
TL;DR: Three statistical analyses are proposed which are based on Global variance, Mean local variance and Sum of squared derivative which exploit local statistics of the visual data and confusion/diffusion properties of the encryption algorithm to correct the errors.
Proceedings ArticleDOI
A security architecture and mechanism for data confidentiality in TCP/IP protocols
TL;DR: A new security architecture consisting of interactive application program, client/server, and security service modules as well as the corresponding security mechanism to provide data confidentiality service is presented.
Proceedings ArticleDOI
Noise removing in encrypted color images by statistical analysis
Naveed Islam,William Puech +1 more
TL;DR: Experimental results show that the proposed method can be used at the receiving end for the possible solution for noise removing in visual data in encrypted domain.
Sobre el impacto y la preponderancia de las licencias de software en el mercado de los dispositivos móviles
TL;DR: The importance of moviles ha crecido en forma considerable en los ultimos diez anos, llegando estos a ocupar un rol preponderante in nuestras vidas Conforme crece el uso y la adopcion de estos dispositivos, los usuarios esperan obtener funcionalidades cada vez mas complejas de los mismos.
Seguridad y privacidad en la plataforma Android
TL;DR: In this paper, the authors analizaremos the seguridad en la plataforma Android and determinaremos si esta permite salvaguardar la privacidad de los usuarios.
References
More filters
Book
Cryptography and data security
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Book
Telecommunication networks: protocols, modeling and analysis
TL;DR: 1. Introduction to Queuing Theory, Layered Architectures in Data Networks, and The Evolution toward Integrated Networks.
Journal ArticleDOI
Security in high-level network protocols
V. Voydock,S. Kent +1 more
TL;DR: The development of new network technologies facilitates certain kinds of attacks on communication systems; for example, it is easy for an intruder to monitor the transmissions of satellite and radio networks.
Book ChapterDOI
Considerations for security in the OSI architecture
TL;DR: The author discusses several goal of security in the OSI architecture as well as where an how the security services that satisfy them could be implemented.
Considerations for Security in the OSI Architecture
TL;DR: In this paper, the authors discuss several goal of security in the Open Systems Interconnection (OSI) architecture as well as where an how the security services that satisfy them could be implemented.