Search results

1 – 10 of 158
Article
Publication date: 25 February 2014

Young-Long Chen and Chung-Ming Cheng

Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new…

Abstract

Purpose

Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new secure authentication which combines a chaos system with an Arnold cat map. The scheme improves upon that of the Wu et al.'s scheme. The scheme proposed herein provides for full anonymity and improves the security of authentication messages for wireless communications.

Design/methodology/approach

A novel scheme that integrates a chaos sequence is used with an Arnold cat map for authentication messages. Authentication messages are shuffled using an Arnold cat map to improve the security of authentication in wireless communications. An analytic approach based on a chaos sequence with an Arnold cat map is developed to secure authentication. The proposed scheme is presented in this study to overcome the inherent drawbacks of existing designs.

Findings

The integrated scheme involves two steps. First, a chaos map is used to generate a set of chaos sequences that is added to the authentication messages. Second, the authentication messages are shuffled using an Arnold cat map. The main feature of the proposed design is such that the chaos systems are sensitive to the initial values of conditions. Sensitivity will lead to long-term behavior unpredictability to reflect the non-linear dynamic systems. Furthermore, to increase the complexity of the authentication message, the authors also use an Arnold cat map.

Originality/value

The proposed scheme provides functions that include full anonymity properties, protection of the real identity of the user, one-time password properties, timestamp benefits and sufficient complexity of the password. The analysis shows that the proposed scheme exhibits the advantages of the chaos system and is more secure than previous schemes. Notably, the proposed scheme is effective for wireless communications.

Details

Engineering Computations, vol. 31 no. 2
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 14 August 2020

F.J. Farsana, V.R. Devi and K. Gopakumar

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream…

1559

Abstract

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream generated from the modified Lorenz-Hyperchaotic system. In this work, the audio file is initially compressed by Fast Walsh Hadamard Transform (FWHT) for removing the residual intelligibility in the transform domain. The resulting file is then encrypted in two phases. In the first phase permutation operation is carried out using modified discrete Henon map to weaken the correlation between adjacent samples. In the second phase it utilizes modified-Lorenz hyperchaotic system for substitution operation to fill the silent periods within the speech conversation. Dynamic keystream generation mechanism is also introduced to enhance the correlation between plaintext and encrypted text. Various quality metrics analysis such as correlation, signal to noise ratio (SNR), differential attacks, spectral entropy, histogram analysis, keyspace and key sensitivity are carried out to evaluate the quality of the proposed algorithm. The simulation results and numerical analyses demonstrate that the proposed algorithm has excellent security performance and robust against various cryptographic attacks.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 1 October 2003

Rusli Ahmad and Noor Azman Ali

The purpose of this article is to analyse the use of a qualitative approach using cognitive mapping techniques in the study of a decision‐making process. This study takes place in…

2373

Abstract

The purpose of this article is to analyse the use of a qualitative approach using cognitive mapping techniques in the study of a decision‐making process. This study takes place in a public sector and in the context of a performance appraisal system (PAS). This is in line with recommendations by scholars and researchers to conduct a management research in a public service context (see Brown, 1999; Bissessar, 2000; Jabroun and Balakrishnan, 2000; O’Donnell and O’Brien, 2000; Redman, Snape and Thompson, 2000). This article also intends to elucidate and justify the methodological approach used, examine the assumptions underlying the use of a particular research design, and provide arguments for the preference of the methodology used. It is hoped that this will contribute to the understanding of the nature and validity of the research undertaken. This article begins by reviewing the theoretical issues of the research framework, the main features of the qualitative methodologies, and finally, the research method applied in this research is determined and justified.

Details

Management Research News, vol. 26 no. 7
Type: Research Article
ISSN: 0140-9174

Keywords

Book part
Publication date: 2 December 2019

Frank Fitzpatrick

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts
Type: Book
ISBN: 978-1-83867-397-0

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Article
Publication date: 1 February 1907

SO much controversy has raged around the subject of newsrooms in the past two years, that librarians are, as a rule, utterly tired of it, and the appearance of still another…

Abstract

SO much controversy has raged around the subject of newsrooms in the past two years, that librarians are, as a rule, utterly tired of it, and the appearance of still another article upon the subject is not calculated to tone down the general spirit of vexation. It requires no little courage to appear in the arena in this year of Grace, openly championing those departments of our institutions which were originally intended to convey the news of the day in the broadest manner.

Details

New Library World, vol. 9 no. 8
Type: Research Article
ISSN: 0307-4803

Book part
Publication date: 7 December 2016

This chapter examines the topic of internal branding from an organizational/behavioral science perspective, theoretically and empirically investigating how organizational members…

Abstract

Synopsis

This chapter examines the topic of internal branding from an organizational/behavioral science perspective, theoretically and empirically investigating how organizational members actually enact corporate brands. A mixed method research procedure serves to surface conscious (i.e., deliberate) and unconscious (i.e., tacit) internal brand meaning enactments in an internationally operating Austrian corporate business-to-business brand. The results are evidence of the potential complexity of real-life internal branding processes that limit the possibility of achieving a cohesive intended internal implementation of corporate brands. The chapter concludes with the managerial implication that purposeful managerial interventions necessitate an understanding of the social system that is the target of an internal branding initiative.

Details

Case Study Research
Type: Book
ISBN: 978-1-78560-461-4

Book part
Publication date: 11 June 2009

Sylvia von Wallpach and Arch G. Woodside

This chapter examines the topic of internal branding from an organizational/behavioral science perspective, theoretically and empirically investigating how organizational members…

Abstract

This chapter examines the topic of internal branding from an organizational/behavioral science perspective, theoretically and empirically investigating how organizational members actually enact corporate brands. A mixed-method research procedure serves to surface conscious (i.e., deliberate) and unconscious (i.e., tacit) internal brand meaning enactments in an internationally operating Austrian corporate business-to-business (B2B) brand. The results are an evidence of the potential complexity of real-life internal branding processes that limit the possibility of achieving a cohesive intended internal implementation of corporate brands. The chapter concludes with the managerial implication that purposeful managerial interventions necessitate an understanding of the social system that is the target of the internal branding initiative

Details

Business-To-Business Brand Management: Theory, Research and Executivecase Study Exercises
Type: Book
ISBN: 978-1-84855-671-3

Article
Publication date: 1 June 1992

Don Marmion

Harvard University Library officials signed a six‐year, multimillion‐dollar contract with OCLC that will involve computer processing by OCLC of bibliographic records for some 5…

Abstract

Harvard University Library officials signed a six‐year, multimillion‐dollar contract with OCLC that will involve computer processing by OCLC of bibliographic records for some 5 million monograph and serial titles in Harvard's library collections.

Details

OCLC Micro, vol. 8 no. 6
Type: Research Article
ISSN: 8756-5196

Article
Publication date: 1 February 1974

Frances Neel Cheney

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Term. 37203. Mrs. Cheney does not sell the books listed here. They are…

Abstract

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Term. 37203. Mrs. Cheney does not sell the books listed here. They are available through normal trade sources. Mrs. Cheney, being a member of the editorial board of Pierian Press, will not review Pierian Press reference books in this column. Descriptions of Pierian Press reference books will be included elsewhere in this publication.

Details

Reference Services Review, vol. 2 no. 2
Type: Research Article
ISSN: 0090-7324

1 – 10 of 158