The security of message transmission is usually a challenge for its participants. Many available programs that work with audio data claim to enable secured communication, but usually do not show the details of the methods used for data encryption. For end users to be confident, it is essential to be aware of the methods and techniques used for data encryption and decryption. Elliptic curve cryptography, an approach to public key cryptography, is now commonly used in cryptosystems. Hence, in this paper we present a method for using elliptic curve cryptography in order to secure audio data communications. Furthermore, we present a tool that implements this method for encrypting an audio file, transmitting it through the network and decrypting the file at the other end.
There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.
Keywords-ITSS-IT security specialist;partitioning; confidentiality; cloud service provider; cloud service client; platform as a service; service as a service; third party auditor I.
One of the new challenges in education is the call for the integration of ICT in teaching and learning. This paper reports on a research project on the development of Interactive Multimedia Learning Systems (IMLS). The principle objective of this project is to create an additional learning tool that combines on-screen text, graphics, animations, audio and video in order to improve the learning process. It also considers the data from the research studies in this area concerning the key issues in designing an IMLS. Further more it includes the experience in developing bilingual interactive multimedia learning system for the IT-skills 1 course.
Comparing textual content is becoming more and more problematic due to the fact that nowadays data is very dynamic. The application of sophisticated methods enables us to compare how similar the documents are to each other. In our research we apply the Cosine Similarity method to compare the similarity of several documents with each other. We also apply the TF-IDF technique which enables us to normalize the results. Normalization of these results is necessary for the fact that there are some words that are repeated several times and from this repetition is determined their importance. Finally we can see a comparison between the similarity of documents with normalized and non-normalized results. As can be seen in the research, the normalization of results has a great value in comparing documents with textual content.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.