{"title":"Cognitive Cryptography in Advanced Data Security","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/AINA.2018.00111","DOIUrl":null,"url":null,"abstract":"In this paper will be described the new way of using cognitive cryptography in data security applications. Cognitive features and personal information may be used in creation of advanced data security techniques, and communication protocols. Such personally oriented procedures may play important role in advanced secure management applications and authentication tasks. Additionally some perception and behavioural features allow to generate unique sequences, which also may be used in modern cryptographic application. Such possibilities will be described in this paper.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2018.00111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper will be described the new way of using cognitive cryptography in data security applications. Cognitive features and personal information may be used in creation of advanced data security techniques, and communication protocols. Such personally oriented procedures may play important role in advanced secure management applications and authentication tasks. Additionally some perception and behavioural features allow to generate unique sequences, which also may be used in modern cryptographic application. Such possibilities will be described in this paper.