Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

3d Wireframe Model Encryption Based On Chaos, Zhao Geng, Shuyun Zhu, Jin Xin, Xiaodong Li, Hongbo Sun, Zhili Xu, Yin Sui, Zhaohui Tian, Sun Nan Jan 2019

3d Wireframe Model Encryption Based On Chaos, Zhao Geng, Shuyun Zhu, Jin Xin, Xiaodong Li, Hongbo Sun, Zhili Xu, Yin Sui, Zhaohui Tian, Sun Nan

Journal of System Simulation

Abstract: With the rapid growth of graphics data in the network environment, the security of graphics data has become a new challenge of network security that needs to be solved urgently. Encryption of 3D models is also urgent. In this paper, an encryption scheme for 3D wireframe model is proposed by using chaos mapping. The method is divided into two parts: confusion and diffuse. A random invertible matrix is generated by using logical mapping to spread the points. The side is scrambled by Arnold's cat map, then the encrypted vertices and polygons are combined to form the final encrypted 3D …


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …