{"title":"高级数据安全中的认知密码学","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/AINA.2018.00111","DOIUrl":null,"url":null,"abstract":"In this paper will be described the new way of using cognitive cryptography in data security applications. Cognitive features and personal information may be used in creation of advanced data security techniques, and communication protocols. Such personally oriented procedures may play important role in advanced secure management applications and authentication tasks. Additionally some perception and behavioural features allow to generate unique sequences, which also may be used in modern cryptographic application. Such possibilities will be described in this paper.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cognitive Cryptography in Advanced Data Security\",\"authors\":\"M. Ogiela, L. Ogiela\",\"doi\":\"10.1109/AINA.2018.00111\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper will be described the new way of using cognitive cryptography in data security applications. Cognitive features and personal information may be used in creation of advanced data security techniques, and communication protocols. Such personally oriented procedures may play important role in advanced secure management applications and authentication tasks. Additionally some perception and behavioural features allow to generate unique sequences, which also may be used in modern cryptographic application. Such possibilities will be described in this paper.\",\"PeriodicalId\":239730,\"journal\":{\"name\":\"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2018.00111\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2018.00111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper will be described the new way of using cognitive cryptography in data security applications. Cognitive features and personal information may be used in creation of advanced data security techniques, and communication protocols. Such personally oriented procedures may play important role in advanced secure management applications and authentication tasks. Additionally some perception and behavioural features allow to generate unique sequences, which also may be used in modern cryptographic application. Such possibilities will be described in this paper.