J. Serey, L. Quezada, B. Ontiveros, I. Soto, R. Carrasco
{"title":"基于层次分析法的密码系统竞争模型的建立","authors":"J. Serey, L. Quezada, B. Ontiveros, I. Soto, R. Carrasco","doi":"10.1109/CSNDSP.2008.4610715","DOIUrl":null,"url":null,"abstract":"The objective of this paper is to develop and to validate a competition model which allows to determine when a cryptosystem type is the best-suiteddest to transmit in a communications channel, depending on the kind of technological used device (cellular phone, PDA, notebook, other ones). The results obtained for this dynamic analysis determine the kind of encryption that should be used at the channel in a given time.","PeriodicalId":241330,"journal":{"name":"2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Development of a competition model for a cryptosystem based on the analytical hierarchic process\",\"authors\":\"J. Serey, L. Quezada, B. Ontiveros, I. Soto, R. Carrasco\",\"doi\":\"10.1109/CSNDSP.2008.4610715\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The objective of this paper is to develop and to validate a competition model which allows to determine when a cryptosystem type is the best-suiteddest to transmit in a communications channel, depending on the kind of technological used device (cellular phone, PDA, notebook, other ones). The results obtained for this dynamic analysis determine the kind of encryption that should be used at the channel in a given time.\",\"PeriodicalId\":241330,\"journal\":{\"name\":\"2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing\",\"volume\":\"130 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNDSP.2008.4610715\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNDSP.2008.4610715","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of a competition model for a cryptosystem based on the analytical hierarchic process
The objective of this paper is to develop and to validate a competition model which allows to determine when a cryptosystem type is the best-suiteddest to transmit in a communications channel, depending on the kind of technological used device (cellular phone, PDA, notebook, other ones). The results obtained for this dynamic analysis determine the kind of encryption that should be used at the channel in a given time.