Application of cryptosystems in protection of data content (CROSBI ID 484789)
Prilog sa skupa u zborniku | izvorni znanstveni rad
Podaci o odgovornosti
Hutinski, Željko ; Bužić, Dalibor
engleski
Application of cryptosystems in protection of data content
This paper asks the question of how to apply cryptosystems to protect data content transmitted via network. Protection means retaining privacy and integrity, availability of information and user identification. Data content security enables a large number of applications (such as e-commerce, e-mail, resource access control in distributed systems, digital signing of films, and so on) realizable in network computer systems, contributing thereby to popularization and spreading of computer networks. Methods and techniques of cryptographic protection are shown, also the advantages and disadvantages of symmetric and asymmetric cryptosystems in particular fields of application. Data authentication is described, and the stress is laid on a digital signature and some its specific forms such as blind signature and signature of potentially infinite streams. At the end, there is given description of modes of entity authentication (also called identification) by use of passwords and challenge-response protocols.
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
Podaci o prilogu
1001-1011-x.
2002.
objavljeno
Podaci o matičnoj publikaciji
Zbornik posvetovanja z mednarodno udeležbo
Podaci o skupu
21. Posvetovanje organizatorjev dela, Management in Evropska unija
predavanje
27.03.2002-29.03.2002
Portorož, Slovenija