2017
DOI: 10.1007/s00500-017-2546-2
|View full text |Cite
|
Sign up to set email alerts
|

Personalized cryptography in cognitive management

Abstract: One of the existing problems of information management is an information security. In this aspects one of possible solution is divide information between a group of persons authorized to manage this information. Information sharing processes allow to protect the information from disclosure. In this paper, the process of division of the information has been enhanced by biometric identification stage. Secure information processes with biometric identification are used to manage very important and strategic data.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…The number of subsets is equal to the number of characteristic features that are possible to specify for the concealed set. 4. In every subset, there are executed independent data sharing protocols based on (m, n)-threshold schemes.…”
Section: The D Data Set With a Number D Of Items Is Split Into Separamentioning
confidence: 99%
See 4 more Smart Citations
“…The number of subsets is equal to the number of characteristic features that are possible to specify for the concealed set. 4. In every subset, there are executed independent data sharing protocols based on (m, n)-threshold schemes.…”
Section: The D Data Set With a Number D Of Items Is Split Into Separamentioning
confidence: 99%
“…and at specific levels of hierarchy. 4. In every subset, there are executed independent data sharing protocols based on (m, n)-threshold schemes.…”
Section: The Number Of Subsets Is Equal To the Number Of Characteristmentioning
confidence: 99%
See 3 more Smart Citations