ML p(r)ior | Research on Information Security Enhancement Approaches and the Applications on HCI Systems

Research on Information Security Enhancement Approaches and the Applications on HCI Systems

2016-02-02
1602.00804 | cs.HC
With rapid development of computer techniques, the human computer interaction scenarios are becoming more and more frequent. The development history of the human-computer interaction is from a person to adapt to the computer to the computer and continually adapt to the rapid development. Facing the process of human-computer interaction, information system daily operation to produce huge amounts of data, how to ensure human-computer interaction interface clear, generated data safe and reliable, has become a problem to be solved in the world of information. To deal with the challenging, we propose the information security enhancement approaches and the core applications on HCI systems. Through reviewing the other state-of-the-art methods, we propose the data encryption system to deal with the issues that uses mixed encryption system to make full use of the symmetric cipher algorithm encryption speed and encryption intensity is high while the encryption of large amounts of data efficiently. Our method could enhance the general safety of the HCI system, the experimental result verities the feasibility and general robustness of our approach.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-04-29

This paper proposes a fully homomorphic encryption encapsulated difference expansion (FHEE-DE) schem… show more
PDF

Highlights - Most important sentences from the article

2019-04-17

The recent spades of cyber security attacks have compromised end users' data safety and privacy in M… show more
PDF

Highlights - Most important sentences from the article

2017-11-19

For the foreseeble future, human beings will likely remain an integral part of the driving task, mon… show more
PDF

Highlights - Most important sentences from the article

2019-04-18

Big Data in IoT is a large and fast-developing area where many different methods and techniques can … show more
PDF

Highlights - Most important sentences from the article

2019-05-08

Artificial Intelligence (AI) has the opportunity to revolutionize the way the United States Departme… show more
PDF

Highlights - Most important sentences from the article

2019-03-15
1904.05528 | cs.CR

Cryptography is the science that secures data and communication over the network by applying mathema… show more
PDF

Highlights - Most important sentences from the article

2019-02-11
1902.04109 | cs.CR

Machine learning techniques have had a long list of applications in recent years. However, the use o… show more
PDF

Highlights - Most important sentences from the article

2019-03-19

The new generation of security threats has been promoted by digital currencies and real-time applica… show more
PDF

Highlights - Most important sentences from the article

2019-01-11

The growth of local data annually implies extra charges for the customers, which makes their busines… show more
PDF

Highlights - Most important sentences from the article

2019-03-06

Security is one of the major concerns of modern communication systems. Users demand a secure communi… show more
PDF

Highlights - Most important sentences from the article

2018-11-24

Cloud computing has become a potential resource for businesses and individuals to outsource their da… show more
PDF

Highlights - Most important sentences from the article

2018-12-06
1812.02361 | cs.CR

As smart bands make life more convenient and provide a positive lifestyle, many people are now using… show more
PDF

Highlights - Most important sentences from the article

2018-08-25
1808.08474 | cs.DC

The Big Data is the most popular paradigm nowadays and it has almost no untouched area. For instance… show more
PDF

Highlights - Most important sentences from the article

2018-11-23

In recent years, and especially since the development of the smartphone, enormous amounts of data re… show more
PDF

Highlights - Most important sentences from the article

2018-12-04

Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is consider… show more
PDF

Highlights - Most important sentences from the article

2018-12-03
1812.00599 | cs.CR

With the rapid development of cloud computing, the privacy security incidents occur frequently, espe… show more
PDF

Highlights - Most important sentences from the article