2006 International Symposium on Communications and Information Technologies 2006
DOI: 10.1109/iscit.2006.340066
|View full text |Cite
|
Sign up to set email alerts
|

Innovative Ubiquitous Cryptography and Sophisticated Implementation

Abstract: Contemporary ubiquitous network has a doubleedged sword or alternative aspects, diversity and threat. While worldwide diversity of ubiquitous platforms has really contributed to enhancing the amenity of our daily life, it is also the cause of illegal attack, intrusion, pretension, etc. Current provisions for information security do not always fulfill overall demands required to ever-growing ubiquitous community. In order to keep usability and achieve safety, we have exploited ubiquitous cryptography named RAC … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The cipher transformation due to simple memory access by the output of a built-in RNG is really dedicated for ubiquitous security [4][5]. HCgorilla is a hardware cryptography-embedded multimedia mobile processor unified Java features with RAP [6][7][8]. We have also exploited a hardware cryptography-embedded multimedia mobile system composed of HCgorilla and its software support system [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…The cipher transformation due to simple memory access by the output of a built-in RNG is really dedicated for ubiquitous security [4][5]. HCgorilla is a hardware cryptography-embedded multimedia mobile processor unified Java features with RAP [6][7][8]. We have also exploited a hardware cryptography-embedded multimedia mobile system composed of HCgorilla and its software support system [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…The stream cipher by HCgorilla is a common key process called RAC (random number-addressing cryptography) [8]. RAC is neither almighty nor universal, and as such, is neither one and only nor exclusive computer security technique.…”
Section: Introductionmentioning
confidence: 99%
“…The cryptographic streaming of multimedia data was further described in detail [10]. Then, the cryptographic streaming or ubiquitous cryptography, RAC was exploited in cooperation with the continuous improvement of HCgorilla and the development of its software support [8].…”
Section: Introductionmentioning
confidence: 99%