1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

Personal Information in Strategic Data Sharing and Communication Protocols

Lidia Ogiela and Marek R. Ogiela
Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology, 30 Mickiewicza Ave., 30-059 Krakow, Poland
Abstract—One of the most important areas of application of biometric patterns or personal information is security purposes. Personal information or individual characteristics may be applied not only for authentication purposed, but also in advanced protocols dedicated for strategic information sharing and distribution. Such techniques allow joining unique personal data with encryption and secret data management processes. In this paper will be described such protocols, which enable reconstruction of secured information exclusively by authorized parties, which received accessing grants for secret information reconstruction. 
 
Index Terms—biometric patterns in cryptography, cryptographic protocols, secret splitting and sharing, strategic data

Cite: Lidia Ogiela and Marek R. Ogiela, "Personal Information in Strategic Data Sharing and Communication Protocols," Lecture Notes on Information Theory, Vol. 3, No. 2, pp. 75-80, December 2015. doi: 10.18178/lnit.3.2.75-80
Copyright © 2012-2015 Lecture Notes on Information Theory, All Rights Reserved