Searched for keywords.author.keyword:"data encryption" OR acmdlCCS:"data encryption"  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 472,798 records   [Expand your search to The ACM Guide to Computing Literature: 2,693,848 records] Help: ACM vs. Guide
1,081 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Editors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
1964
Result 1 – 20 of 1,081
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1 published by ACM
June 2014 SIGMOD '14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 9,   Downloads (12 Months): 147,   Downloads (Overall): 630

Full text available: PDFPDF
Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot "learn" anything ...
Keywords: data encryption, query processing
[result highlights]

2 published by ACM
October 2004 ACM SIGCOMM Computer Communication Review: Volume 34 Issue 5, October 2004
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 27,   Downloads (Overall): 773

Full text available: PDFPDF
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our protocol, legitimate users (who share a short secret-key) communicate using an M-ry signal set while an attacker (who does ...
Keywords: quantum cryptography, data encryption
[result highlights]

3 published by ACM
November 2013 SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 13,   Downloads (Overall): 85

Full text available: PDFPDF
Modern ciphers constitute a challenge task for cryptanalysis algorithms due to their diversity and nonlinearity. This problem can be formulated as NP-Hard. It has long been subject to various attacks; available results, emerged many years ago remain insufficient when handling large instances due to resources requirement which increase with the ...
Keywords: heuristics, data encryption standard, Feistel ciphers, cryptanalysis
[result highlights]

4 published by ACM
June 2016 SIGMOD '16: Proceedings of the 2016 International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 13,   Downloads (12 Months): 292,   Downloads (Overall): 334

Full text available: PDFPDF
Today, outsourcing query processing tasks to remote cloud servers becomes a viable option; such outsourcing calls for encrypting data stored at the server so as to render it secure against eavesdropping adversaries and/or an honest-but-curious server itself. At the same time, to be efficiently managed, outsourced data should be indexed, ...
Keywords: adaptive indexing, data encryption, cloud computing, database cracking
[result highlights]

5 published by ACM
September 2012 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) - Special Issue on Multimedia Security: Volume 8 Issue 2S, September 2012
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10,   Downloads (12 Months): 50,   Downloads (Overall): 659

Full text available: PDFPDF
Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing textures and shading. Because there is no continuous tone within these types of images, ...
Keywords: image hatching, structural similarity, Cryptography, data encryption, visual cryptography
[result highlights]

6 published by ACM
July 1981 Communications of the ACM: Volume 24 Issue 7, July 1981
Publisher: ACM
Bibliometrics:
Citation Count: 53
Downloads (6 Weeks): 4,   Downloads (12 Months): 74,   Downloads (Overall): 1,927

Full text available: PDFPDF
Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit keys but enciphering 3 times (encrypt with a first key, decrypt with a second key, then encrypt with the first key again) increases security over simple double encryption. This ...
Keywords: DES, cryptography, cipher, encipher, encrypt, data encryption standard, encryption, cryptanalysis, multiple encryption
[result highlights]

7 published by ACM
December 1978 Communications of the ACM: Volume 21 Issue 12, Dec. 1978
Publisher: ACM
Bibliometrics:
Citation Count: 598
Downloads (6 Weeks): 26,   Downloads (12 Months): 349,   Downloads (Overall): 7,977

Full text available: PDFPDF
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
Keywords: networks, protocols, public-key cryptosystems, authentication, data encryption standard, encryption, security
[result highlights]

8 published by ACM
December 2016 SoICT '16: Proceedings of the Seventh Symposium on Information and Communication Technology
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 33,   Downloads (Overall): 33

Full text available: PDFPDF
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. One of the challenging problems of classifying encrypted application traffic is the imbalanced property of network data. Usually, the amount of unencrypted traffic is much higher than the amount of ...
Keywords: imbalanced data, encrypted network traffic, machine learning

9 published by ACM
November 1999 ACM Transactions on Information and System Security (TISSEC): Volume 2 Issue 4, Nov. 1999
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 10,   Downloads (12 Months): 47,   Downloads (Overall): 1,693

Full text available: PDFPDF
We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryptographic systems. It exploits the engineering aspects involved in the implementation of cryptosystems and might succeed ...
Keywords: cryptography, timing attack, data encryption standard, cryptanalysis
[result highlights]

10 published by ACM
April 2014 ACM SIGMETRICS Performance Evaluation Review: Volume 41 Issue 4, March 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 63,   Downloads (Overall): 550

Full text available: PDFPDF
The data source that produces data continuously in high volume and high velocity with large varieties of data types creates Big Data, and causes problems and challenges to Machine Learning (ML) techniques that help extract, analyze and visualize important information. To overcome these problems and challenges, we propose to make ...
Keywords: hybrid cloud, big data, encryption, retrievability, machine learning
[result highlights]

11 published by ACM
December 2016 ICCIS '16: Proceedings of the 2016 International Conference on Communication and Information Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 26,   Downloads (Overall): 26

Full text available: PDFPDF
This paper describes trends in the field of encryption, based on the principles of quantum cryptography. Here is a description of commercial self-compensation quantum key distribution system (QKDS). A description of quantum-cryptographic network stand is also proposed. Stand based on integrated commercial QKDS Clavis2 from idQuantique (Switzerland). Research of quantum ...
Keywords: data encryption, cryptography, quantum key distribution, Synchronization, photon pulses
[result highlights]

12 published by ACM
February 2010 ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 8,   Downloads (Overall): 68

Full text available: PDFPDF
With the ever-increasing growth of data communication, the need for security and privacy has become a strong necessity. AES is a symmetric block cipher that is intended to replace DES as the approved standard for wide range of applications. Numbers of hardware techniques have been developed for implementation of AES ...
Keywords: DES-data encryption standard, HDL-hardware description language, AES-advanced encryption standard
[result highlights]

13 published by ACM
December 1978 Communications of the ACM: Volume 21 Issue 12, Dec. 1978
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 178

Full text available: PDFPDF
Keywords: authentication, data encryption standard, encryption, security, networks, protocols, public-key cryptosystems
[result highlights]

14 published by ACM
September 2015 MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8,   Downloads (12 Months): 96,   Downloads (Overall): 221

Full text available: PDFPDF  ePubePub
The Internet of Things (IoT) is envisioned to digitize the physical world, resulting in a digital representation of our proximate living space. The possibility of inferring privacy violating information from IoT data necessitates adequate security measures regarding data storage and communication. To address these privacy and security concerns, we introduce ...
Keywords: data security, internet of things, system design, computing on encrypted data, encrypted computing
[result highlights]

15 published by ACM
April 2017 SAC '17: Proceedings of the Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 12,   Downloads (12 Months): 16,   Downloads (Overall): 16

Full text available: PDFPDF
Application-level data management middleware solutions are becoming increasingly compelling to deal with the complexity of a multi-cloud or federated cloud storage and multitenant storage architecture. However, these systems typically support traditional data mapping strategies that are created under the assumption of a fixed and rigorous database schema, and mapping data ...
Keywords: cloud data storage, data encryption, multi-tenant SaaS, secure data management, NoSQL, untrusted clouds
[result highlights]

16 published by ACM
March 2016 WIR '16: Proceedings of the ACM Symposium on Women in Research 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 47,   Downloads (Overall): 47

Full text available: PDFPDF
Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper ...
Keywords: KDC (Key Distribution Center), DES (Data Encryption Standard), Client, Kerberos, Server
[result highlights]

17 published by ACM
June 2015 SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 83,   Downloads (Overall): 233

Full text available: PDFPDF
During the present era, mobiles and smart devices are in abundance. A number of services have been provided through these devices. Ubiquitous services is gaining popularity in the present era. Ubiquity in healthcare is a sector which has gained importance in the current decade, as medical costs are not affordable ...
Keywords: access control, security monitoring, trusted computing, security, data encryption, cloud data security, patterns, access controls, cloud computing, cryptography
[result highlights]

18 published by ACM
December 2015 PPREW-5: Proceedings of the 5th Program Protection and Reverse Engineering Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11,   Downloads (12 Months): 57,   Downloads (Overall): 109

Full text available: PDFPDF
White-box cryptography sits at the intersection of software protection and cryptography. Software protection is aimed at preventing attackers from modifying software or extracting secrets from it through reverse-engineering or other means. Software protection becomes white-box cryptography when it is applied to software implementations of cryptographic algorithms.
Keywords: Cryptography, Homomorphic Encryption, Software Protection, Advanced Encryption Standard, Differential Computation Analysis, Differential Fault Analysis, Reverse Engineering, Side Channels, Software Security Measures, Data Encryption Standard, Differential Power Analysis, Trusted Execution Environments, White-box Cryptography
[result highlights]

19 published by ACM
November 2007 ACM SIGGRAPH Computer Graphics: Volume 41 Issue 4, November 2007
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 421

Full text available: PdfPdf
This article describes the development and implementation of a data compression algorithm designed specifically for fingerprints, referred to as GBP compression. The algorithm is herein discussed. Data Compression algorithms can be designed for general applications, meaning the input data is unknown. This is more commonly referred to as generic data. ...
Keywords: automated fingerprint identification systems, compression, graphics, image compression, image quality, retrofitting, data encryption, data integrity, AFIS, data compression, limits of compression, portability, software engineering, compatibility, double compression, fingerprinting, serial compression
[result highlights]

20 published by ACM
November 2007 ACM SIGSOFT Software Engineering Notes: Volume 32 Issue 6, November 2007
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 2,   Downloads (Overall): 475

Full text available: PDFPDF
This article describes the development and implementation of a data compression algorithm designed specifically for fingerprints, referred to as GBP compression. The algorithm is herein discussed. Data Compression algorithms can be designed for general applications, meaning the input data is unknown. This is more commonly referred to as generic data. ...
Keywords: data encryption, data integrity, AFIS, data compression, limits of compression, portability, software engineering, compatibility, double compression, fingerprinting, serial compression, automated fingerprint identification systems, compression, graphics, image compression, image quality, retrofitting
[result highlights]

Result 1 – 20 of 1,081
Result page: 1 2 3 4 5 6 7 8 9 10 >>



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us
 
Export Formats