{"title":"采用非对称加密算法,提高保密通信中敏感数据的安全性","authors":"P. Fanfara, E. Dankova, M. Dufala","doi":"10.1109/SAMI.2012.6208959","DOIUrl":null,"url":null,"abstract":"Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication\",\"authors\":\"P. Fanfara, E. Dankova, M. Dufala\",\"doi\":\"10.1109/SAMI.2012.6208959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.\",\"PeriodicalId\":158731,\"journal\":{\"name\":\"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"volume\":\"280 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAMI.2012.6208959\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAMI.2012.6208959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.