Title :
[Copyright notice]
Abstract :
The following topics are dealt with: colored Petri nets; iterative multiplication strategy; intrusion detection; security; GUI; stream cipher; quantum key distribution protocol; entanglement; cryptanalysis; RFID; mutual authentication protocol; video watermarking; chaotic map; document images; proxy signature; reversible data embedding scheme; cryptographic keys management; H.264 and scalable video coding.
Keywords :
Petri nets; chaotic communication; cryptographic protocols; digital signatures; document image processing; graphical user interfaces; image watermarking; iterative methods; quantum cryptography; quantum entanglement; radiofrequency identification; video coding; GUI; H.264; RFID; chaotic map; colored Petri nets; cryptanalysis; cryptographic keys management; document images; entanglement; intrusion detection; iterative multiplication strategy; mutual authentication protocol; proxy signature; quantum key distribution protocol; reversible data embedding scheme; scalable video coding; security; stream cipher; video watermarking;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2011 8th International ISC Conference on
Conference_Location :
Mashhad
Print_ISBN :
978-1-4673-0078-0
DOI :
10.1109/ISCISC.2011.6062329