scispace - formally typeset
Open AccessDissertation

Efficient Key Management for Data Security using TDES

Gaurav Puri, +1 more
Reads0
Chats0
About
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article

An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds

TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI

Secure Communication Based on Ambient Audio

TL;DR: This paper experimentally verified the feasibility of the proposed fuzzy-cryptography protocol in four different realistic settings and a laboratory experiment and applies statistical tests to show that the entropy of fingerprints based on ambient audio is high.
Book ChapterDOI

New Algorithms for Secure Outsourcing of Modular Exponentiations

TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Journal ArticleDOI

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

TL;DR: The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
Journal ArticleDOI

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

TL;DR: This paper study's the authorization mechanism for PKEET, and proposes four types of authorization policies to enhance the privacy of users' data, and proves its security based on the computational Diffie-Hellman assumption in the random oracle model.
Journal ArticleDOI

Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

TL;DR: This paper considers how an external aggregator or multiple parties can learn some algebraic statistics over participants' privately owned data while preserving the data privacy, and proposes several protocols that successfully guarantee data privacy under semi-honest model.
Related Papers (5)