Figure 1 - uploaded by Alessandro Zaccagnini
Content may be subject to copyright.
Similar publications
Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has computation-free decoding process to decrypt the images. Generally visual cryptographic methods utilize the technique of secret sharing in which secret image is divided into shares and when k shares out of n stack together the secret image will reveal....
The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which a...
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography. This might cause some disadvantage and give way for attacks on the algo...