Proceedings ArticleDOI
A novel and efficient key sharing technique for web applications
P. M. Durai Raj Vincent,E. Sathiyamoorthy +1 more
- pp 1-5
TLDR
The aim here is to bring an effective public key sharing algorithm with lesser execution time.Abstract:
Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using encryption algorithms which convert it into ciphertext where keys are playing the vital role in encryption and decryption process. Keys will be either secret one or public key. Since public key cryptosystem gain its momentum from its evolution, sharing of public key is equally an important task like secret key sharing. There are various traditional public key sharing techniques are there, still the importance of sharing of public key lies in how fast the keys will be shared. Even though compromising the public key will not do much damage to the whole system as the key will not be used for the decryption process to get back the original plain text, still it is required to share it securely. Because of the slower execution time, other symmetric encryption techniques are preferred over asymmetric techniques in web applications. In cyber world, execution time is the real challenge before the researchers. Our aim here is to bring an effective public key sharing algorithm with lesser execution time.read more
Citations
More filters
Journal ArticleDOI
A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning
M. Akshay Kumaar,Duraimurugan Samiayya,P. M. Durai Raj Vincent,Kathiravan Srinivasan,Chuan-Yu Chang,H Ganesh +5 more
TL;DR: A hybrid framework using Deep Learning named “ImmuneNet” to recognize the latest intrusion attacks and defend healthcare data is proposed, which is comparatively better and up-to-date than other existing approaches in classifying between requests that are normal, intrusion, and other cyber attacks.
Proceedings ArticleDOI
Multi Authority Privacy Preserving Protocol in Cloud Computing Authentication using Grouping Algorithm and EDAC-MAC
TL;DR: A simple, efficient and verified approach to ensure the integrity of data stored in the cloud is proposed, where grouping algorithm along with EDAC-MACS is used to provide effective security control with revoking and decryption being more efficient with different algorithms for encryption as well as decryption.
References
More filters
Proceedings ArticleDOI
A key management scheme for wireless sensor networks using deployment knowledge
TL;DR: It is shown that the performance of sensor networks can be substantially improved with the use of the proposed random key pre-distribution scheme, which exploits deployment knowledge and avoids unnecessary key assignments.
Journal ArticleDOI
A key transport protocol based on secret sharing applications to information security
TL;DR: The protocol eliminates the need for a cipher, yet effectively combines the advantages of symmetric and public-key ciphers, and can be used to build a new key management scheme that allows the service providers to generate different keys for different sets of receivers, and to renew these keys in a convenient way.
Proceedings ArticleDOI
Generating and sharing biometrics based session keys for secure cryptographic applications
TL;DR: A simple and effective protocol to securely share crypto-biometric keys derived from biometrics and another protocol to generate and share session keys which are valid for only one communication session are proposed.
Journal ArticleDOI
Asymmetric Key Pre-distribution Scheme for sensor networks
TL;DR: The properties of this asymmetric key pre-distribution scheme are that, the compromise of keying material servers does not reveal any information about users' secret keys and the session keys of privileged subset of users; if computational assumptions are considered, each user has very low storage requirement.
Proceedings ArticleDOI
Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party
TL;DR: A novel three-party quantum authenticated key distribution with a partially trusted third party protocol that will be preferable for network systems in/between institutions, which deal with highly sensitive information.