[Home ] [Archive]    
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Registration ::
Main Menu
Home::
Journal Information::
Articles archive::
Submission Instruction::
Registration::
Submit article::
Site Facilities::
Contact us::
::
Google Scholar

Citation Indices from GS

Search in website

Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
:: Search published articles ::
Showing 1 results for Security

Ms Avishan Salehi, Dr. Nikbakhsh Javadian,
Volume 13, Issue 1 (6-2022)
Abstract

Today, a high volume of multimedia information is transmitted in computer networks, such as the internet, that the requirement for achieving high security level against unauthorized access. the visual secret sharing scheme is a cryptographic system without requiring a secret key that is able to encrypt information in a multi - user computer network. in this research, a visual secret sharing scheme including two strategies for binary communications and multiple relationships were considered. in binary communications, an entity plays a role in the role of the server and an entity in the role of the client 's service in this strategy using a network - based visual secret sharing scheme ( 2 , 2 ) a secure approach to establish double relations where the provider entity is sending confidential information after authentication of the client 's service. then, two main phases of registration and verification are performed on the basis of the visual secret sharing scheme based on random networks. in tuple communication ( n , n ) an entity plays a role in the role of the server and several entities in the role of the service, and then two main phases of registration and verification are executed.
 

Page 1 from 1     

مجله انجمن ایرانی تحقیق در عملیات Iranian Journal of Operations Research
Persian site map - English site map - Created in 0.05 seconds with 27 queries by YEKTAWEB 4679