scholarly journals A novel matrix multiplication based LSB substitution mechanism for data security and authentication

Author(s):  
Kumari Rinki ◽  
Puspneel Verma ◽  
Ranjeet Kumar Singh
2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

Sign in / Sign up

Export Citation Format

Share Document