Strength of Crypto-Semantic System of Tabular Data Protection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.
Authors and Affiliations
Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar
Motion Blobs as a Feature for Detection on Smoke
Disturbance that is caused due to visual perception with the atmosphere is coined as smoke, but the major problem is to quantify the detected smoke that is made up of small particles of carbonaceous matter in the air, re...
Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers
Detection and recognition of traffic signs in a video streams consist of two steps: the detection of signs in the road scene and the recognition of their type. We usually evaluate globally this process. This evaluated ap...
Adaptive Simulated Evolution based Approach for Cluster Optimization in Wireless Sensor Networks
Energy consumption minimization is crucial for the constrained sensors in wireless sensor networks (WSNs). Partitioning WSNs into optimal set of clusters is a promising technique utilized to minimize energy consumption a...
A Posteriori Pareto Front Diversification Using a Copula-Based Estimation of Distribution Algorithm
We propose CEDA, a Copula-based Estimation of Distribution Algorithm, to increase the size, achieve high diversity and convergence of optimal solutions for a multiobjective optimization problem. The algorithm exploits th...
OSPF vs EIGRP: A Comparative Analysis of CPU Utilization using OPNET
Routing is difficult in enterprise networks because a packet might have to traverse many intermediary nodes to reach the final destination. The selection of an appropriate routing protocol for a large network is difficul...