• FOYDALANILGAN ADABIYOTLAR RO‘YXATI
  • MUHAMMAD AL-XORAZMIY NOMIDAGI TOSHKENT AXBOROT TEXNOLOGIYALARI UNIVERSITETI
  • Ikki tomonlama qisman gomomorfik shifrlash usuli




    Download 418,9 Kb.
    bet11/20
    Sana20.12.2023
    Hajmi418,9 Kb.
    #124487
    1   ...   7   8   9   10   11   12   13   14   ...   20
    Ikki tomonlama qisman gomomorfik shifrlash usuli
    Xususiy biometriya uchun ikki tomonlama qisman gomomorfik shifrlash

    usuli bugungi xususiy biometrikaga o‘xshash edi, chunki u biometrik xususiyatlar ma’lumotlarini gomomorfik shifrlash yordamida himoya qilishni taklif qildi va shifrlangan xususiyatlarning o‘xshashligini Hamming va Evklidan kabi ko‘rsatkichlar bilan o‘lchadi. masofalar. Biroq, ishonchli tomonlar tomonidan boshqarilishi kerak bo‘lgan maxfiy kalitlarning mavjudligi sababli usul ma’lumotlar yo‘qotilishiga zaif edi. Yondashuvning keng qo‘llanilishi, shuningdek, shifrlash sxemalarining murakkab kalitlarini boshqarish va katta hisoblash va ma’lumotlarni saqlash talablaridan aziyat chekdi.

    21
    XULOSA
    Bu loyiha ishim davomida men ko‘plab bilim va malakaga ega bo‘ldim. Ularni

    amalda o‘zim sinab ko‘rdim. Loyiha ishimni bajarish mobaynida biometric shifrlash algorimlarining hayotda va Axborot xavfsizligi sohasida juda katta o‘ringa ega ekanligiga amin bo‘ldim. Biometric shifrlash algoritmlari o‘zining tez, sodda, foydalaniluvchanligi va yuqori darajadagi ishonchliligi jihatidan ancha qulay hisoblanadi. Masalan, hozirgi zamonda deyarli barcha insonlarda hech bo‘lmaganda bitta biometric shifrlash algoritmidan foydalaniladigan qurilmasi bor – bu oddiy smartfon. So‘nggi ishlab chiqarilayotgan smartfonlarning deyarli barchasida barmoq izi skaneri va yuzdan tanib olish sistemasi ya’ni, “Face ID” mavjud.
    Xulosa qilib aytadigan bo ‘lsam, bu loyiha ishidan meni tushuncham insonlar hayotida biometric shifrlash algoritmlari hozirgi zamon uchun katta ahamiyat kasb etmoqda va bundan keyin ham juda muhim rol o‘ynaydi.

    22
    FOYDALANILGAN ADABIYOTLAR RO‘YXATI
    1. Jump up to: a b c Biometrics Open Protocol (BOPS) III. IEEE 2410-2018,

    IEEE Standards Association. 2018. Accessed 7/22/2018.


    2. Selleck, Evan. “Craig Federighi Says Apple is ‘Focusing Face ID on Single User Authentication.’” Phone Hacks. 12-01-2017. Accessed 7-15-2018.
    3. Jump up to:a b Florian Schroff, Dmitry Kalenichenko, James Philbin. “FaceNet: A unified embedding for face recognition and clustering.” CVPR 2015: 815-823
    4. Jump up to:a b c Private.id

    5. Unpublished 2018 white paper, Private Identity, LLC.

    6. Evans, Johnny. “iPhone X & Face ID: Everything you need to know.” ComputerWorld. 9/13/2017. Accessed 7/22/2018
    7. Ben Shneiderman. 1973. Polynomial search. Softw. Pract. Exper. 3, 1 (January 1973), 5-8.
    8. Karn, Ujjwal. “An Intuitive Explanation of Convolutional Neural Networks.” The Data Science Blog. 8/11/2016, Accessed 7/22/2018.
    9. Lian, Shiguo, Jinsheng Sun, and Zhiquan Wang. “One-way hash function based on neural network”.
    10.“One-Way Encryption.”

    23
    MUHAMMAD AL-XORAZMIY NOMIDAGI TOSHKENT AXBOROT TEXNOLOGIYALARI UNIVERSITETI

    AXBOROT XAVFSIZLIGINI TA’MINLASH” kafedrasi talabalari uchun


    Download 418,9 Kb.
    1   ...   7   8   9   10   11   12   13   14   ...   20




    Download 418,9 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Ikki tomonlama qisman gomomorfik shifrlash usuli

    Download 418,9 Kb.