Results for 'cryptography'

16 found
Order:
  1. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  79
    Applications of (Neutro/Anti)sophications to Semihypergroups.A. Rezaei, Florentin Smarandache & S. Mirvakili - 2021 - Journal of Mathematics 2021 (1):1-7.
    A hypergroup, as a generalization of the notion of a group, was introduced by F. Marty in 1934. The first book in hypergroup theory was published by Corsini. Nowadays, hypergroups have found applications to many subjects of pure and applied mathematics, for example, in geometry, topology, cryptography and coding theory, graphs and hypergraphs, probability theory, binary relations, theory of fuzzy and rough sets and automata theory, physics, and also in biological inheritance.
    Download  
     
    Export citation  
     
    Bookmark  
  4. Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  7. Онтология на квантовата информация.Vasil Penchev - 2005 - Philosophical Alternatives 14 (2):110-116.
    The article is devoted to quantum information (including its subdomains, namely: quantum communication, quantum computer, quantum cryptography), and its philosophical meaning. Paradox EPR, Bell’s inequality, phenomena of teleportation are discussed of a philosophical point of view. Quantum mechanical nonlocal correlations are interpreted as topological inseparabilities. Information is considered both as a fundamental physical quantity and as a philosophical category.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Философия на квантовата информация.Vasil Penchev - 2009 - Sofia: BAS: IPhR.
    The book is devoted to the contemporary stage of quantum mechanics – quantum information, and especially to its philosophical interpretation and comprehension: the first one of a series monographs about the philosophy of quantum information. The second will consider Be l l ’ s inequalities, their modified variants and similar to them relations. The beginning of quantum information was in the thirties of the last century. Its speed development has started over the last two decades. The main phenomenon is entanglement. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  10. ITS for teaching DES information security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Pro-Generative Adversarial Network and V-stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Zeno Paradox, Unexpected Hanging Paradox (Modeling of Reality & Physical Reality, A Historical-Philosophical view).Farzad Didehvar - manuscript
    . In our research about Fuzzy Time and modeling time, "Unexpected Hanging Paradox" plays a major role. Here, we compare this paradox to the Zeno Paradox and the relations of them with our standard models of continuum and Fuzzy numbers. To do this, we review the project "Fuzzy Time and Possible Impacts of It on Science" and introduce a new way in order to approach the solutions for these paradoxes. Additionally, we have a more general discussion about paradoxes, as Philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Zeno Paradox, Unexpected Hanging Paradox (Modeling of Reality & Physical Reality, A Historical-Philosophical view).Farzad Didehvar - manuscript
    In our research about Fuzzy Time and modeling time, "Unexpected Hanging Paradox" plays a major role. Here, we compare this paradox to the Zeno Paradox and the relations of them with our standard models of continuum and Fuzzy numbers. To do this, we review the project "Fuzzy Time and Possible Impacts of It on Science" and introduce a new way in order to approach the solutions for these paradoxes. Additionally, we have a more general discussion about paradoxes, as Philosophical back (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. A new approach in classical electrodynamics to protect principle of causality.Biswaranjan Dikshit - 2014 - Journal of Theoretical Physics and Cryptography 5:1-4.
    In classical electrodynamics, electromagnetic effects are calculated from solution of wave equation formed by combination of four Maxwell’s equations. However, along with retarded solution, this wave equation admits advanced solution in which case the effect happens before the cause. So, to preserve causality in natural events, the retarded solution is intentionally chosen and the advance part is just ignored. But, an equation or method cannot be called fundamental if it admits a wrong result (that violates principle of causality) in addition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Reformulation of Dirac’s theory of electron to avoid negative energy or negative time solution.Biswaranjan Dikshit - 2017 - Journal of Theoretical Physics and Cryptography 13:1-4.
    Dirac’s relativistic theory of electron generally results in two possible solutions, one with positive energy and other with negative energy. Although positive energy solutions accurately represented particles such as electrons, interpretation of negative energy solution became very much controversial in the last century. By assuming the vacuum to be completely filled with a sea of negative energy electrons, Dirac tried to avoid natural transition of electron from positive to negative energy state using Pauli’s exclusion principle. However, many scientists like Bohr (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result of (...)
    Download  
     
    Export citation  
     
    Bookmark