scholarly journals P2P PROTOCOL FOR TRANSFERRING DIGITAL INHERITANCE

InterConf ◽  
2021 ◽  
pp. 383-390
Author(s):  
Oleksandr Kurbatov ◽  
Oleksii Shapoval ◽  
Yelyzaveta Hurieva

This document proposes a new protocol for sharing sensitive digital data in the form of digital inheritance. Main goals of the protocol are ensuring the integrity and confidentiality of the data as well as the anonymity of the receiver. The protocol makes use of different cryptographic algorithms in order to ensure certain features of transmitted data, including digital signatures, MAC codes and stealth addresses.

2021 ◽  
Vol 11 (6) ◽  
pp. 7867-7874
Author(s):  
U. Iftikhar ◽  
K. Asrar ◽  
M. Waqas ◽  
S. A. Ali

Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.


Author(s):  
Dhanashree Toradmalle ◽  
Jayabhaskar Muthukuru ◽  
B Sathyanarayana

With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm.


In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of providing security is cryptography and steganography. Employing a hybrid of cryptography and steganography enhances the security of data. This paper employs LSB (Least significant Bit) as the steganography algorithm and AES, RSA, DES, 3DES, and Blowfish algorithms as cryptographic algorithms to encrypt a message that should be hidden in a cover image. The results are represented in the form of execution time, PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error) and the histogram of main and covered image. The experimental results reveal that all the algorithms achieve appropriate quality of stego image. They can be used as cryptographic algorithms to encrypt a message before applying steganography algorithms.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 767-789
Author(s):  
Leya Elizabeth Sunny ◽  
Dr. Varghese Paul

Stage of networking is quintessential task in which security comes into play. Securing these networks which contains confidential digital data that needs to secured will be the agenda of cryptography. Many cryptographic algorithms increment their strengths over parameters like key size, increasing the rounds of iteration and finally using confusion box as S-box as it has best robustness. So, this paper mainly focusses over securing digital data with the help of S-box function over Data Encryption Standard (DES) algorithm. For this, a plain text and key will be given to this DES as it extracts 8x8(64) bit characters from the key and converting them into its corresponding ASCII value and are concatenating to form an 8 value by taking mod16. These will give to 8 S-box in order to generate its corresponding output to make even more secure and also shows dynamic DES gives much result than other crypto methods. The evaluation of this integrated s-box and DES shows much fruitful results over factors like non-linearity, Avalanche criterion, Balance, Robustness to linear cryptanalysis, Robustness to differential cryptanalysis.


Author(s):  
D. R. Denley

Scanning tunneling microscopy (STM) has recently been introduced as a promising tool for analyzing surface atomic structure. We have used STM for its extremely high resolution (especially the direction normal to surfaces) and its ability for imaging in ambient atmosphere. We have examined surfaces of metals, semiconductors, and molecules deposited on these materials to achieve atomic resolution in favorable cases.When the high resolution capability is coupled with digital data acquisition, it is simple to get quantitative information on surface texture. This is illustrated for the measurement of surface roughness of evaporated gold films as a function of deposition temperature and annealing time in Figure 1. These results show a clear trend for which the roughness, as well as the experimental deviance of the roughness is found to be minimal for evaporation at 300°C. It is also possible to contrast different measures of roughness.


Author(s):  
Stuart McKernan ◽  
C. Barry Carter

Convergent-beam electron diffraction (CBED) patterns contain an immense amount of information relating to the structure of the material from which they are obtained. The analysis of these patterns has progressed to the point that under appropriate, well specified conditions, the intensity variation within the CBED discs may be understood in a quantitative sense. Rossouw et al for example, have produced numerical simulations of zone-axis CBED patterns which show remarkable agreement with experimental patterns. Spence and co-workers have obtained the structure factor parameters for lowindex reflections using the intensity variation in 2-beam CBED patterns. Both of these examples involve the use of digital data. Perhaps the most frequent use for quantitative CBED analysis is the thickness determination described by Kelly et al. This analysis has been implemented in a variety of different ways; from real-time, in-situ analysis using the microscope controls, to measurements of photographic prints with a ruler, to automated processing of digitally acquired images. The potential advantages of this latter process will be presented.


Author(s):  
M. Pan

It has been known for many years that materials such as zeolites, polymers, and biological specimens have crystalline structures that are vulnerable to electron beam irradiation. This radiation damage severely restrains the use of high resolution electron microscopy (HREM). As a result, structural characterization of these materials using HREM techniques becomes difficult and challenging. The emergence of slow-scan CCD cameras in recent years has made it possible to record high resolution (∽2Å) structural images with low beam intensity before any apparent structural damage occurs. Among the many ideal properties of slow-scan CCD cameras, the low readout noise and digital recording allow for low-dose HREM to be carried out in an efficient and quantitative way. For example, the image quality (or resolution) can be readily evaluated on-line at the microscope and this information can then be used to optimize the operating conditions, thus ensuring that high quality images are recorded. Since slow-scan CCD cameras output (undistorted) digital data within the large dynamic range (103-104), they are ideal for quantitative electron diffraction and microscopy.


Author(s):  
D. Shindo

Imaging plate has good properties, i.e., a wide dynamic range and good linearity for the electron intensity. Thus the digital data (2048x1536 pixels, 4096 gray levels in log scale) obtained with the imaging plate can be used for quantification in electron microscopy. By using the image processing system (PIXsysTEM) combined with a main frame (ACOS3900), quantitative analysis of electron diffraction patterns and high-resolution electron microscope (HREM) images has been successfully carried out.In the analysis of HREM images observed with the imaging plate, quantitative comparison between observed intensity and calculated intensity can be carried out by taking into account the experimental parameters such as crystal thickness and defocus value. An example of HREM images of quenched Tl2Ba2Cu1Oy (Tc = 70K) observed with the imaging plate is shown in Figs. 1(b) - (d) comparing with a structure model proposed by x-ray diffraction study of Fig. 1 (a). The image was observed with a JEM-4000EX electron microscope (Cs =1.0 mm).


2019 ◽  
Vol 12 (1) ◽  
pp. 7-20
Author(s):  
Péter Telek ◽  
Béla Illés ◽  
Christian Landschützer ◽  
Fabian Schenk ◽  
Flavien Massi

Nowadays, the Industry 4.0 concept affects every area of the industrial, economic, social and personal sectors. The most significant changings are the automation and the digitalization. This is also true for the material handling processes, where the handling systems use more and more automated machines; planning, operation and optimization of different logistic processes are based on many digital data collected from the material flow process. However, new methods and devices require new solutions which define new research directions. In this paper we describe the state of the art of the material handling researches and draw the role of the UMi-TWINN partner institutes in these fields. As a result of this H2020 EU project, scientific excellence of the University of Miskolc can be increased and new research activities will be started.


2020 ◽  
Vol 75 (5) ◽  
pp. 490-499
Author(s):  
Yuri Y. Kiryachkov ◽  
Marina V. Petrova ◽  
Bagautdin G. Muslimov ◽  
Sergey A. Bosenko ◽  
Mikhail M. Gorlachev

Background.At the same time, the main effect of the use of this drug is the elimination of the autonomic nervous system dysfunction and sympatholysis. It seems important to search for a method of indications and selection of a dose of dexmedetomidine in intensive care.Aims to improve the clinical effectiveness of the electrophysiological navigation of the prolonged use of dexmedetomidine in patients with brain pathology of various origins.Methods.The study included 83 patients 2050 days after the traumatic brain injury, anoxic damage; consequences of acute disorders of cerebral. 37 patients comprised the 1st intervention group with a clinical course of dexmedetomidine (male 28; female 9; average age 49.62.3 years) and 46 patients comprised the 2nd control group without pharmacological correction with dexmedetomidine (male 23; female 23, average age 512.5 years). Criteria for the inclusion of prolonged infusion of the drug dexmedetomidine (Orion Pharma, Finland) are based on heart rate variability (HRV) indicators characteristic of sympathetic hyperactivity, the target task of titration of doses of dexmedetomidine served as the parameters for achieving normal HRV indicators, the appearance of parasympathetic hyperactivity served as the basis for reducing the dosage of the drug or stopping it of application. HRV parameters were recorded before dexmetomedine infusion-initially, on 13; 45; 910; 1520 days of drug administration.Results.The starting dose of dexmedetomidine with sympathetic hyperactivity in patients was 0.12 to 0.24 g.kg1.hr1(average dose 0.160.01; total 200 mg/day). According to digital data from HRV, the effective dose of dexmedetomidine ED50 was 0.260.03 g.kg1.hr1(total daily 353.835.1 g) and was achieved on day 910 using dexmedetomidine.Conclusions.The protective role of dexmedetomidine with correction of sympathetic hyperactivity based on electrophysiological navigation according to the HRV is reliable in the following indicators: The improvement of consciousness; a significant decrease in the incidence of distress lung syndrome; septic shock; mortality.


Sign in / Sign up

Export Citation Format

Share Document