Strength of Crypto-Semantic System of Tabular Data Protection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.
Authors and Affiliations
Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar
Performance Analysis of MIMO-OFDM System Using Singular Value Decomposition and Water Filling Algorithm
In this paper, MIMO is paired up with OFDM to improve the performance of wireless transmission systems. Multiple antennas are employed both at the transmitting as well as receiving ends. The performance of an OFDM...
Virtual Enterprise Network based on IPSec VPN Solutions and Management
Informational society construction can’t be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual...
Regression Test-Selection Technique Using Component Model Based Modification: Code to Test Traceability
Regression testing is a safeguarding procedure to validate and verify adapted software, and guarantee that no errors have emerged. However, regression testing is very costly when testers need to re-execute all the test c...
Study of Cross-Platform Technologies for Data Delivery in Regional Web Surveys in the Education
Web-surveys are a popular form of collecting primary data from various studies. However, mass regional polls have their own characteristics, including the following: it is necessary to take into account various platforms...
LPA Beamformer for Tracking Nonstationary Accelerated Near-Field Sources
In this paper, a computationally very efficient algorithm for direction of arrival (DOA) as well as range parameter estimation is proposed for near-field narrowband nonstationary accelerated moving sources. The proposed...