Virtual-optical information security system based on public key infrastructure

2005 ◽  
Author(s):  
Xiang Peng ◽  
Peng Zhang ◽  
Lilong Cai ◽  
Hanben Niu
2013 ◽  
Vol 748 ◽  
pp. 953-957
Author(s):  
Jing Song Tian ◽  
Xiao Qin Wu ◽  
Rong Hu

with the network intelligent development, the technique widely application brings huge convenient for peoples life and work. The network openness exist great hidden troubles along with the information security. Based on the security system of public key infrastructure, we can determine the users information security and completion through the method of providing secret keys and certificate managing by both sides. Through the research of public key infrastructure, we can design out the planning of electronic payment platform and apply it in the practical society. This is the most important point that network staff and electronic commerce works are searching.


Author(s):  
Sapna Tyagi ◽  
Preeti Sirohi ◽  
Mohammad Yahiya Khan ◽  
Ashraf Darwish

The presented chapter elaborates fundamentals issues in information security, safety, and trust in industrial settings. The chapter introduces basics of information security that includes confidentially, integrity, and availability (CIA), which are some of the essential ingredients of information security. The chapter also discusses various reasons for security loop-holes prevalent in industrial setting. A majority of the chapter focuses on security framework and control implementation, which includes various authorizations and authentication methods. The shared secret systems, passwords, token systems, public key infrastructure (PKI), and biometrics system are most common methods used for authentication.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Sign in / Sign up

Export Citation Format

Share Document