Open AccessDissertation
Efficient Key Management for Data Security using TDES
Gaurav Puri,Ajay Kakkar +1 more
Reads0
Chats0
About:
The article was published on 2015-07-28 and is currently open access. It has received 2 citations till now. The article focuses on the topics: Encryption & Encryption software.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal Article
An Efficient Certificate less Encryption for Secure Data Sharing In Public Clouds
TL;DR: The study proposes a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds and proposes an extension to the above approach to improve the efficiency of encryption at the data owner.
References
More filters
Journal ArticleDOI
Secure Communication Based on Ambient Audio
Dominik Schürmann,Stephan Sigg +1 more
TL;DR: This paper experimentally verified the feasibility of the proposed fuzzy-cryptography protocol in four different realistic settings and a laboratory experiment and applies statistical tests to show that the entropy of fingerprints based on ambient audio is high.
Book ChapterDOI
New Algorithms for Secure Outsourcing of Modular Exponentiations
TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Journal ArticleDOI
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
Huang Lu,Jie Li,Mohsen Guizani +2 more
TL;DR: The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
Journal ArticleDOI
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
TL;DR: This paper study's the authorization mechanism for PKEET, and proposes four types of authorization policies to enhance the privacy of users' data, and proves its security based on the computational Diffie-Hellman assumption in the random oracle model.
Journal ArticleDOI
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
TL;DR: This paper considers how an external aggregator or multiple parties can learn some algebraic statistics over participants' privately owned data while preserving the data privacy, and proposes several protocols that successfully guarantee data privacy under semi-honest model.