scispace - formally typeset
Search or ask a question

Showing papers on "Cryptography published in 1969"


Journal ArticleDOI
TL;DR: Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with.
Abstract: Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper.

12 citations


Journal ArticleDOI
TL;DR: This paper proposes an asymmetric cryptosystem to secure RFID transmission in the retail supply chain using Elliptic Curve Cryptographic (ECC) techniques, one of the most powerful, and widely use public-key cryptography techniques today.
Abstract: The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in the retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. ECC is one of the most powerful, and widely use public-key cryptography techniques today, which provide greater strength than other current cryptosystems (such as RSA, and DSA/DH) for any given key length. In addition it enables the use of smaller keys to get the same levels of security as RSA, resulting in significant means for wireless and mobile applications, including handheld devices.

7 citations