scispace - formally typeset
Search or ask a question

Answers from top 16 papers

More filters
Papers (16)Insight
Open accessBook ChapterDOI
23 Nov 2015
19 Citations
In this paper, a novel texture encryption scheme is proposed which complements the existing 3D object encryption methods.
In this paper, however, we propose a scheme that can crack Word 2003 document password based on the supercomputer made in China (Sunway Bluelight MPP supercomputer) by analyzing Microsoft Office document file format, Word 2003 document encryption mechanism and vulnerability that exists in the encryption mechanism.
In an attempt to further improve the efficiency of the encryption and decryption mechanism of asymmetric approach, we have proposed a new and novel encryption technique.
The overall results suggest the hybrid encryption approach for the encryption and decryption process.
Open accessBook ChapterDOI
01 Jul 2013
19 Citations
We propose a new encryption primitive called Membership Encryption.
To address the deficiency of conventional encryption algorithms, we propose a symmetric encryption technique based on linear geometry.
This paper introduces a selective encryption method named Selective significant data encryption (SSDE) for text data encryption.
Proceedings ArticleDOI
Xinqiang Li, Lili Yu, Lihuan Wei 
01 Nov 2013
22 Citations
That is, in accordance with the order of the initial encryption algorithm, the improved Micro Genard encryption algorithm and the famous Base64 encryption algorithm, the user's information is gradually encrypted, and the algorithm security is greatly enhanced.
We propose using a different encryption scheme, namely, "pseudo-one-time pad" encryption, to produce the instructions and data ciphertext.
This paper presents a simple Encryption/Decryption technique which enables all kinds of file for encryption and decryption.
Proceedings ArticleDOI
Shijie Jia, Luning Xia, Bo Chen, Peng Liu 
30 May 2016
29 Citations
Conventional overwriting-based and encryption-based solutions are not sufficient, as they cannot remove these artifacts.
The results showed improvements in the encryption quality.
As a result, the encryption speed of this encryption algorithm is improved effectively.
The system's security is greatly improved, through researching several famous data encryption algorithms, improving some data encryption algorithms and arranging them in a suitable order.
We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.
Theoretical analysis results show that the proposed encryption scheme has effective encryption and efficiencies.

Related Questions

How to avoid pornography?5 answersTo avoid pornography, there are several strategies that can be implemented. One approach is the use of technology, such as software filters, to restrict access to sexually-themed Internet content. Legislators and industry players have attempted to employ technology to restrict the availability of such content to minors, but the constitutionality of these efforts depends on the efficacy and deployment of adult verification technology. Another strategy is to provide education and guidance to children and youngsters, emphasizing the negative consequences of pornography and promoting healthy habits. Parents, government, and society can play a role in preventing the consumption of pornography by children through various means, such as giving directions to children, engaging them in positive activities, and holding seminars or socialization events. By combining technological measures and educational efforts, it is possible to create a safer environment and protect children from the harmful effects of pornography.
How can i reduce the word count for essay?4 answersTo reduce the word count for an essay, there are several strategies that can be employed. First, break down the project into smaller, manageable sections. This can make the task seem less overwhelming and help maintain structure. Additionally, consider starting the draft with a specific goal, idea, or question in mind. This can help keep the writing focused and on track. Another approach is to ignore spelling, grammar, and punctuation until a later draft. This allows ideas to flow freely without interruption. It can also be helpful to start writing in a section where you feel most confident, such as the body of the essay, and then go back to the introduction. Finally, take breaks when needed and trust in your own abilities. Giving yourself time to rest and clear your mind can lead to fresh perspectives and new ideas.
Encrypting ?4 answersAn encrypting method is a process of converting plain text into cipher text using a secret key or parameter, and transmitting it to a database. In the field of cryptography, encryption is used to obscure information for secrecy and confidentiality in communications. It can also be used for authentication, digital signatures, and digital cash. One paper discusses an encrypting device that ensures the confidentiality of emails transmitted from an Internet facsimile machine (IFAX) without additional components or construction. Another paper proposes an encrypting method that improves data dispersion without increasing the mounting size of a common key block encryption system. Additionally, an encrypting apparatus and method are described that improve the reliability of the encrypting function by producing a parameter specific to a solid-state imaging element and using it to encrypt authentication information.
How can i remove plagiarism from my document?3 answersTo remove plagiarism from your document, there are several steps you can take. First, make sure you have the intention not to steal or copy someone else's work and not to duplicate your own work. Secondly, recheck your work before submitting it for publication and use online plagiarism checking tools to screen for any instances of plagiarism. Additionally, consider using a copy detection mechanism that eliminates unnecessary comparisons between documents addressing different subjects. Finally, increase your knowledge and awareness about plagiarism to avoid unintentional involvement in it. By following these steps, you can ensure that your document is free from plagiarism and maintain your academic integrity.
How do I turn off Facebook encryption?6 answers
How to remove redshift?6 answers