On cryptographic techniques for on-line bankcard payment transactions using open networks

Author(s):  
Wenbo Mao
2011 ◽  
pp. 126-141 ◽  
Author(s):  
Andreas Mitrakas

Open EDI is a concept appropriate to address the needs of commercial business-to-business relationships in an open environment. While open EDI, an open electronic commerce technology, can be used for ad hoc commercial transactions, delivering it over public open networks poses a challenge that contains a substantial legal component. How can the pre-transaction delay time be shortened in a way that allows for the speedy conclusion of the commercial part of the deal? Legal shortcomings can pose a potential danger for trading partners if not properly underpinned before initiating business transactions. Dynamic contracting procedures preceding the endorsement of an interchange agreement are a viable alternative to face-to-face negotiations. Recon is an on-line system to make available such a functionality over an open network by means of a repository of negotiated legal terms.


Author(s):  
Nur Syafiqah Mohd Shamsuddin ◽  
Sakinah Ali Pitchay

Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes. Cloud providers never guarantee the security of data. One of the best ways to overcome this issue is to have the data encrypted before it reaches the cloud servers. Cryptographic becomes a common mechanism used to transmit data securely in open networks, but there are also some challenges to implement encryption internally due to key management. Either the keys are vulnerable towards any security attacks such as HTTP-focused-brute-force attack during transmit over the network, in case of the keys are kept at the user site, or keys are missing if the device is stolen. Thus, location-based encryption adds another layer of security on top of existing encryption method. Location-based encryption enhances security by implementing location information into the encryption and decryption process to counter the possible problems. Location coordinates are used as a key for encrypting the data and the cipher text can only be decrypted if and only the decrypted location is matched with the location that has been computed with the key. In this paper discuss on location-based encryption technique that has been implemented in previous works which are asymmetric, symmetric and hybrid algorithm followed by its strengths and weaknesses. This paper finds that majority of the researchers used hybrid algorithm to implement their location-based encryption instead of using the asymmetric algorithm or hybrid algorithm alone because the hybrid algorithm has fast computation of symmetric algorithm and high security of asymmetric dual keys


Author(s):  
William Krakow

In the past few years on-line digital television frame store devices coupled to computers have been employed to attempt to measure the microscope parameters of defocus and astigmatism. The ultimate goal of such tasks is to fully adjust the operating parameters of the microscope and obtain an optimum image for viewing in terms of its information content. The initial approach to this problem, for high resolution TEM imaging, was to obtain the power spectrum from the Fourier transform of an image, find the contrast transfer function oscillation maxima, and subsequently correct the image. This technique requires a fast computer, a direct memory access device and even an array processor to accomplish these tasks on limited size arrays in a few seconds per image. It is not clear that the power spectrum could be used for more than defocus correction since the correction of astigmatism is a formidable problem of pattern recognition.


Author(s):  
A.M.H. Schepman ◽  
J.A.P. van der Voort ◽  
J.E. Mellema

A Scanning Transmission Electron Microscope (STEM) was coupled to a small computer. The system (see Fig. 1) has been built using a Philips EM400, equipped with a scanning attachment and a DEC PDP11/34 computer with 34K memory. The gun (Fig. 2) consists of a continuously renewed tip of radius 0.2 to 0.4 μm of a tungsten wire heated just below its melting point by a focussed laser beam (1). On-line operation procedures were developped aiming at the reduction of the amount of radiation of the specimen area of interest, while selecting the various imaging parameters and upon registration of the information content. Whereas the theoretical limiting spot size is 0.75 nm (2), routine resolution checks showed minimum distances in the order 1.2 to 1.5 nm between corresponding intensity maxima in successive scans. This value is sufficient for structural studies of regular biological material to test the performance of STEM over high resolution CTEM.


Author(s):  
Neil Rowlands ◽  
Jeff Price ◽  
Michael Kersker ◽  
Seichi Suzuki ◽  
Steve Young ◽  
...  

Three-dimensional (3D) microstructure visualization on the electron microscope requires that the sample be tilted to different positions to collect a series of projections. This tilting should be performed rapidly for on-line stereo viewing and precisely for off-line tomographic reconstruction. Usually a projection series is collected using mechanical stage tilt alone. The stereo pairs must be viewed off-line and the 60 to 120 tomographic projections must be aligned with fiduciary markers or digital correlation methods. The delay in viewing stereo pairs and the alignment problems in tomographic reconstruction could be eliminated or improved by tilting the beam if such tilt could be accomplished without image translation.A microscope capable of beam tilt with simultaneous image shift to eliminate tilt-induced translation has been investigated for 3D imaging of thick (1 μm) biologic specimens. By tilting the beam above and through the specimen and bringing it back below the specimen, a brightfield image with a projection angle corresponding to the beam tilt angle can be recorded (Fig. 1a).


Author(s):  
G.Y. Fan ◽  
J.M. Cowley

In recent developments, the ASU HB5 has been modified so that the timing, positioning, and scanning of the finely focused electron probe can be entirely controlled by a host computer. This made the asynchronized handshake possible between the HB5 STEM and the image processing system which consists of host computer (PDP 11/34), DeAnza image processor (IP 5000) which is interfaced with a low-light level TV camera, array processor (AP 400) and various peripheral devices. This greatly facilitates the pattern recognition technique initiated by Monosmith and Cowley. Software called NANHB5 is under development which, instead of employing a set of photo-diodes to detect strong spots on a TV screen, uses various software techniques including on-line fast Fourier transform (FFT) to recognize patterns of greater complexity, taking advantage of the sophistication of our image processing system and the flexibility of computer software.


Author(s):  
John F. Mansfield ◽  
Douglas C. Crawford

A method has been developed that allows on-line measurement of the thickness of crystalline materials in the analytical electron microscope. Two-beam convergent beam electron diffraction (CBED) patterns are digitized from a JEOL 2000FX electron microscope into an Apple Macintosh II microcomputer via a Gatan #673 CCD Video Camera and an Imaging Systems Technology Video 1000 frame-capture board. It is necessary to know the lattice parameters of the sample since measurements are made of the spacing of the diffraction discs in order to calibrate the pattern. The sample thickness is calculated from measurements of the spacings of the fringes that are seen in the diffraction discs. This technique was pioneered by Kelly et al, who used the two-beam dynamic theory of MacGillavry relate the deviation parameter (Si) of the ith fringe from the exact Bragg condition to the specimen thickness (t) with the equation:Where ξg, is the extinction distance for that reflection and ni is an integer.


Author(s):  
W.J. de Ruijter ◽  
P. Rez ◽  
David J. Smith

There is growing interest in the on-line use of computers in high-resolution electron n which should reduce the demands on highly skilled operators and thereby extend the r of the technique. An on-line computer could obviously perform routine procedures hand, or else facilitate automation of various restoration, reconstruction and enhan These techniques are slow and cumbersome at present because of the need for cai micrographs and off-line processing. In low resolution microscopy (most biologic; primary incentive for automation and computer image analysis is to create a instrument, with standard programmed procedures. In HREM (materials researc computer image analysis should lead to better utilization of the microscope. Instru (improved lens design and higher accelerating voltages) have improved the interpretab the level of atomic dimensions (approximately 1.6 Å) and instrumental resolutior should become feasible in the near future.


Sign in / Sign up

Export Citation Format

Share Document