Showing 1-2 of 2 results
Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures, but one problem has to be solved to enable these algorithms: binding cryptographic keys to machine or user identities.
Abstract: Information Security has always been a very substantial facet when it comes to hindering unauthorised access, destruction or inspection of confidential data. Today every field in the world makes use of multimedia information. There is need to secure the confidential information used in these areas. There are multiple approaches to secure information. One of