2016
DOI: 10.1016/j.pmcj.2015.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic techniques of strategic data splitting and secure information management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
7

Relationship

6
1

Authors

Journals

citations
Cited by 43 publications
(27 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…18,[20][21][22] The new area of applications of linguistic data-sharing schemes is cloud computing. 18,[20][21][22] The new area of applications of linguistic data-sharing schemes is cloud computing.…”
Section: The Application Of Linguistic Information-sharing Schemesmentioning
confidence: 99%
“…18,[20][21][22] The new area of applications of linguistic data-sharing schemes is cloud computing. 18,[20][21][22] The new area of applications of linguistic data-sharing schemes is cloud computing.…”
Section: The Application Of Linguistic Information-sharing Schemesmentioning
confidence: 99%
“…The process of information labelling is run based on the use of individual features of every protocol participant (shadow holder) (Ogiela 2016;Ogiela and Ogiela 2015a). An individual personal code is contained in bio-labels (biometric information).…”
Section: Personalized Cryptographymentioning
confidence: 99%
“…The public key is used to calculate the result of Cipher data. The public key has the same character as the private key S. If S denotes the private key, then the public key can be denoted by T. The public key has a row of numbers as the key to finding the Cipher [9] [10]. For the process of calculating the data of the Cipher text, must first do the plaintext division into blocks based on the number of elements T. Known the number of elements of T as many as 8 elements.…”
Section: Merkle Hellmanmentioning
confidence: 99%