Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
June 2014
SIGMOD '14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 9, Downloads (12 Months): 147, Downloads (Overall): 630
Full text available:
PDF
Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot "learn" anything ...
Keywords:
data encryption, query processing
CCS:
Data encryption
Keywords:
data encryption
Primary CCS:
Data encryption
References:
IBM Corporation. IBM InfoSphere Guardium Data Encryption for DB2 and IMS Databases. http://www-01.ibm.com/software/data/db2imstools/db2tools/ibmencrypt/.
Oracle Corporation. Transparent Data Encryption. http://www.oracle.com/technetwork/database/options/advanced-security/index-099011.html.
2
October 2004
ACM SIGCOMM Computer Communication Review: Volume 34 Issue 5, October 2004
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 27, Downloads (Overall): 773
Full text available:
PDF
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our protocol, legitimate users (who share a short secret-key) communicate using an M-ry signal set while an attacker (who does ...
Keywords:
quantum cryptography, data encryption
Title:
Quantum-noise: protected data encryption for WDM fiber-optic networks
CCS:
Data encryption
Keywords:
data encryption
Abstract:
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we ... fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our ... of key generation (quantum key generation), the performance criteria of data encryption
Primary CCS:
Data encryption
References:
E. Corndorf, G. Barbosa, C. Liang, H. P. Yuen, and P. Kumar. High-speed data encryption over 25km of fiber by two-mode coherent-state quantum cryptography. Optics Letters, 28:2040--2042, 2003.
E. Corndorf, G. S. Kanter, C. Liang, and P. Kumar. Quantum-noise protected data encryption for wdm networks. In 2004 Conference on Lasers Electro Optics (CLEO'04) post-deadline, San Francisco, CA, 2004.
E. Corndorf, G. S. Kanter, C. Liang, and P. Kumar. Data encryption over an inline-amplified 200km-long WDM line using coherent-state quantum cryptography. In Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, April 2004.
Full Text:
Quantum-noise?protected data encryption for WDMfiber-optic networksEric Corndorf, Chuang Liang, Gregory S. Kanter, Prem ... cryptographicobjective of key generation (quantum key generation), theperformance criteria of data encryption are established andcarefully considered.Categories and Subject DescriptorsE.3 [Data Encryption] ]General TermsSecurityKeywordsQuantum cryptography, Data encryption1. INTRODUCTIONFor more than twenty years, ... Such ob-jectives include user authentication, bit commitment, keygeneration, and recently, data encryption. . To date, thecryptographic objective most considered in the literature ... to publicly com-municate secret messages over classical channels by driv-ing data encrypters like the information-theoretically secureone-time pad (OTP) [1] or more efficient ... amplifiable, networkable, and loss toler-ant. Note that key generation and data encryption are twodifferent cryptographic objectives with different sets of cri-teria by ... a phase circle.in section 2 we outline our quantum-noise protected data- -encryption protocol (call the ?? protocol), in section 3 weaddress issues ...
ENCRYPTION PROTOCOLWe have implemented two versions of our quantum-noiseprotected data- -encryption protocol using different signalsets?one using polarization states [11] (polarization-modescheme) and ...
... an attacker knows p(K)and p(X) exactly.For the cryptographic objective of data encryption, ,be it classical or quantum-noise?protected, the relevantinformation-theoretic quantities are:i) H(X|YB,K), ... limit [16]which is valid when H(X|YE,K) = 0. Note thatour data- -encryption protocol operates in a regime whereH(X|YE,K) ?= 0. Also note ... in a regime whereH(X|YE,K) ?= 0. Also note that for data encryption, , con-trary to the case for key generation [cf. Eq. ... key s-bit secret keyPseudo-randomkey-extenderQuantum-statetransformationFigure 2: Summary of the quantum-noise protected data encryption protocol. In our experiments, the?pseudo-random key-extender? is implemented by a ...
... most commercialencrypters work today.It is, therefore, the goal of practical data encrypters to a)drive ?1,2 as close to 1 as possible for ... Note that an alternativeoperationally-meaningful criterion for the cryptographic ob-jective of data encryption is described in Ref. [9]Towards the goal of satisfying the ... Eqs. (22) and(23), we offer a new approach to practical data encryption, ,wherein the irreducible randomness of quantum mechanicsis used to perform ...
... replied [19]. In Ref. [20], it is claimedthat the ?? data encryption protocol, operating in a regimewhere H(X|YE,K) < H(X|YB,K), already permits ... the polarization-mode experimental setupnaturally breaks into two parts: the quantum-noise?protected data- -encryption transmitter/receiver pair and theWDM fiber line (which also carries classical ...
... we have developed schemes towards the cryp-tographic objective of practical data encryption by usingthe fundamental and irreducible quantum-measurement un-certainty of coherent states. ... we have implemented and demonstratedtwo high-speed versions of the ?? data- -encryption protocolusing both polarization and time modes, and evaluated theschemes? performances ... WDM lines. Whereasthe polarization-mode experiments have demonstrated theefficacy of the data- -encryption
... Corndorf, G. Barbosa, C. Liang, H.P. Yuen, andP. Kumar. High-speed data encryption over 25km offiber by two-mode coherent-state quantumcryptography. Optics Letters, 28:2040?2042, ... E. Corndorf, G.S. Kanter, C. Liang, and P. Kumar.Quantum-noise protected data encryption for wdmnetworks. In 2004 Conference on Lasers Electro Optics(CLEO?04) post-deadline, ...
3
November 2013
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 13, Downloads (Overall): 85
Full text available:
PDF
Modern ciphers constitute a challenge task for cryptanalysis algorithms due to their diversity and nonlinearity. This problem can be formulated as NP-Hard. It has long been subject to various attacks; available results, emerged many years ago remain insufficient when handling large instances due to resources requirement which increase with the ...
Keywords:
heuristics, data encryption standard, Feistel ciphers, cryptanalysis
CCS:
Data encryption
Keywords:
data encryption standard
Abstract:
... time, genetic programing for cryptanalysis of a simplified variant of Data encryption standard algorithm. Experiments were performed to study the effectiveness of ...
Primary CCS:
Data encryption
References:
Schaefer, E. F. 1996. A Simplified Data Encryption Standard Algorithm. Cryptologia, 20, 1 (1996), 77--84.
Full Text:
... time, genetic programing for cryptanalysis of a simplified variant of Data encryption standard algorithm. Experiments were performed to study the effectiveness of ... difficulties encountered. Categories and Subject Descriptors E.3 [Code breaking]: Simplified data encryption Standard. General Terms Algorithms, Security, Cryptanalysis. Keywords Heuristics; cryptanalysis; Feistel ... General Terms Algorithms, Security, Cryptanalysis. Keywords Heuristics; cryptanalysis; Feistel ciphers; data encryption standard; 1. INTRODUCTION Cryptanalysis is the science that consists in ... requires much processing resources and so, less success in practice. Data encryption standard is a Feistel Cipher for symmetric key encryption scheme, ...
... transformation again, which will cancel the changes of XOR operation. Data Encryption Standard (DES or 16DES in short), a variant of Feistel ... bits. Detailed description of DES is given in [16]. Simplified Data encryption standard (SDES in short) is a variant of DES [17] ...
... Practices. Ed. Printice Hall. [17] Schaefer, E.F. 1996. A Simplified Data Encryption Standard Algorithm. Cryptologia, 20,1 (1996), 77-84. [18] Nelson, G., Wallis, ...
4
June 2016
SIGMOD '16: Proceedings of the 2016 International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 13, Downloads (12 Months): 292, Downloads (Overall): 334
Full text available:
PDF
Today, outsourcing query processing tasks to remote cloud servers becomes a viable option; such outsourcing calls for encrypting data stored at the server so as to render it secure against eavesdropping adversaries and/or an honest-but-curious server itself. At the same time, to be efficiently managed, outsourced data should be indexed, ...
Keywords:
adaptive indexing, data encryption, cloud computing, database cracking
CCS:
Data encryption
Keywords:
data encryption
Primary CCS:
Data encryption
Full Text:
... $15.00DOI: http://dx.doi.org/10.1145/2882903.2882932but-curious service provider itself. Such concerns have motivatedresearch on data encryption and query answering over encrypteddata, starting with SQL query processing ...
... DATAWe now discuss how our server can perform adaptive indexingover data encrypted by our encryption scheme. Notably, the choiceof ? in our ...
... on three types of data: (a) plain data without encryption, (b)data encrypted by the scheme introduced in Section 3, and (c) dataencrypted ...
... not allow for sorting by cross-tuple comparisons; as we dis-cussed, data encrypted by our scheme can be sorted only in a query-triggered ...
5
September 2012
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) - Special Issue on Multimedia Security: Volume 8 Issue 2S, September 2012
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10, Downloads (12 Months): 50, Downloads (Overall): 659
Full text available:
PDF
Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing textures and shading. Because there is no continuous tone within these types of images, ...
Keywords:
image hatching, structural similarity, Cryptography, data encryption, visual cryptography
CCS:
Data encryption
Keywords:
data encryption
Primary CCS:
Data encryption
Full Text:
... used to perform this comparison.Categories and Subject Descriptors: E.3 [Data]: Data Encryption; ; I.3.3 [Computer Graphics]: Picture/Image Generation; I.3.8[Computer Graphics]: ApplicationsGeneral Terms: ... VerificationAdditional Key Words and Phrases: Cryptography, visual cryptography, image hatching, data encryption, , structural similarityACM Reference Format:Weir, J., Yan, W., and Kankanhalli, ...
6
July 1981
Communications of the ACM: Volume 24 Issue 7, July 1981
Publisher: ACM
Bibliometrics:
Citation Count: 53
Downloads (6 Weeks): 4, Downloads (12 Months): 74, Downloads (Overall): 1,927
Full text available:
PDF
Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit keys but enciphering 3 times (encrypt with a first key, decrypt with a second key, then encrypt with the first key again) increases security over simple double encryption. This ...
Keywords:
DES, cryptography, cipher, encipher, encrypt, data encryption standard, encryption, cryptanalysis, multiple encryption
CCS:
Data encryption
Keywords:
data encryption standard
Abstract:
<par>Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit ...
Primary CCS:
Data encryption
References:
Dime, W., and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer (June 1977), 74-84.
Hellman, M., Merkle, R., Schroeppel, R., Washington, L., Diffie, W., Pohlig, S., and Schweitzer, P. Results of an initial attempt to cryptanalyze the NBS data encryption standard. Information Systems Laboratory SEL 76-042 (Sept. 9, 1976).
Morris, R., Sloane, N.J.A., and Wyner, A.D. Assessment of the National Bureau of Standards proposed federal data encryption standard. Cryptologia 1 (July 1977), 281-291.
Senate Select Committee on Intelligence. Involvement of the NSA in the development of the data encryption standard. News release (Apr. 12, 1978).
Full Text:
... University Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit ... Key Words and Phrases: encryption; encrypt; cipher; encipher; cryptography; DES; data encryption standard; cryptanalysis; multiple encryption CR Categories: 3.56, 3.57, 4.9 Introduction ... have argued that the 56-bit key used in the Federal Data Encryption Standard (DES) [9] is too small and that current technology ...
... allows users of the new (two key) system to decrypt data encrypted by users of the old (single key) system. While the ...
... Dime, W., and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer (June 1977), 74-84. 3. Diffie, W., and Hellman, ... P. Results of an initial attempt to cryptanalyze the NBS data encryption standard. Information Systems Laboratory SEL 76-042 (Sept. 9, 1976). 6. ... A.D. Assessment of the National Bureau of Standards proposed federal data encryption standard. Cryptologia 1 (July 1977), 281-291. 9. National Bureau of ... Intelligence. Involvement of the NSA in the development of the data encryption standard. News release (Apr. 12, 1978). 11. Shannon, C.E. Communication ...
7
December 1978
Communications of the ACM: Volume 21 Issue 12, Dec. 1978
Publisher: ACM
Bibliometrics:
Citation Count: 598
Downloads (6 Weeks): 26, Downloads (12 Months): 349, Downloads (Overall): 7,977
Full text available:
PDF
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
Keywords:
networks, protocols, public-key cryptosystems, authentication, data encryption standard, encryption, security
CCS:
Data encryption
Keywords:
data encryption standard
References:
National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977.
Full Text:
... Words and Phrases: encryption, security, authentication, networks, protocols, public-key cryptosystems, data encryption standard CR Categories: 3.81, 4.31, 4.35 Introduction In the context ...
... used. With a conventional encryption algorithm, such as the NBS Data Encryption Standard [7], the same key is used for both encryption ...
... (available from ACM, New York). 7. National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., ...
8
December 2016
SoICT '16: Proceedings of the Seventh Symposium on Information and Communication Technology
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 33, Downloads (Overall): 33
Full text available:
PDF
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. One of the challenging problems of classifying encrypted application traffic is the imbalanced property of network data. Usually, the amount of unencrypted traffic is much higher than the amount of ...
Keywords:
imbalanced data, encrypted network traffic, machine learning
9
November 1999
ACM Transactions on Information and System Security (TISSEC): Volume 2 Issue 4, Nov. 1999
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 10, Downloads (12 Months): 47, Downloads (Overall): 1,693
Full text available:
PDF
We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryptographic systems. It exploits the engineering aspects involved in the implementation of cryptosystems and might succeed ...
Keywords:
cryptography, timing attack, data encryption standard, cryptanalysis
Title:
Strength of two data encryption standard implementations under timing attacks
Keywords:
data encryption standard
Abstract:
<par>We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack ...
References:
MATSUI, M. 1994. The first experimental crytanalysis of the data encryption standard. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'94, Santa Barbara, CA), Y. G. Desmedt, Ed. Springer-Verlag, New York, 1-11.]]
MENEZES,A.J.,VAN OORSCHOT,P.C.,AND VANSTONE, S. A. 1997. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL. NBS 1977. NBS FIPS PUB 46, Data Encryption Standard. U.S. Department of Commerce.]]
Full Text:
Strength of Two Data Encryption Standard Implementations Under Timing AttacksStrength of Two Data Encryption StandardImplementations Under Timing AttacksALEJANDRO HEVIA and MARCOS KIWIUniversity of ChileWe ... of ChileWe study the vulnerability of two implementations of the Data Encryption Standard (DES)cryptosystem under a timing attack. A timing attack is ... be inferred from timing measurements.Categories and Subject Descriptors: E.3 [Data]: Data Encryption? ?Data Encryption Standard(DES); C.3 [Computer Systems Organization]: Special-Purpose and Application-BasedSystemsGeneral Terms: SecurityAdditional ... and Application-BasedSystemsGeneral Terms: SecurityAdditional Key Words and Phrases: Cryptanalysis, cryptography, Data Encryption Standard,timing attack1. INTRODUCTIONAn ingenious new type of cryptanalytic attack was ...
... (see, e.g., English and Hamilton [1996] and Markoff [1996]).3. THE DATA ENCRYPTION STANDARDDES is the most widely used cryptosystem in the world, ...
... November 1999.MATSUI, M. 1994. The first experimental crytanalysis of the data encryption standard. InProceedings of the Conference on Advances in Cryptology (CRYPTO?94, ... Press, Inc., Boca Raton, FL.NBS 1977. NBS FIPS PUB 46, Data Encryption Standard. U.S. Department of Commerce.RIVEST, R., SHAMIR, A., AND ADELMAN, ...
10
April 2014
ACM SIGMETRICS Performance Evaluation Review: Volume 41 Issue 4, March 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 63, Downloads (Overall): 550
Full text available:
PDF
The data source that produces data continuously in high volume and high velocity with large varieties of data types creates Big Data, and causes problems and challenges to Machine Learning (ML) techniques that help extract, analyze and visualize important information. To overcome these problems and challenges, we propose to make ...
Keywords:
hybrid cloud, big data, encryption, retrievability, machine learning
Full Text:
... Data Key Store (DKS) into ahybrid computing ecosystem that uses data encryption andintegrity techniques to address data con?dentiality as wellas verifying data ...
... data associatedwith Big Data analytics minimizing computational overheadis valuable. Unnecessary data encryption on high volume,high velocity data would lead to ine?ciencies.3.1 Characteristics ...
11
December 2016
ICCIS '16: Proceedings of the 2016 International Conference on Communication and Information Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 26, Downloads (Overall): 26
Full text available:
PDF
This paper describes trends in the field of encryption, based on the principles of quantum cryptography. Here is a description of commercial self-compensation quantum key distribution system (QKDS). A description of quantum-cryptographic network stand is also proposed. Stand based on integrated commercial QKDS Clavis2 from idQuantique (Switzerland). Research of quantum ...
Keywords:
data encryption, cryptography, quantum key distribution, Synchronization, photon pulses
Keywords:
data encryption
Full Text:
... and privacy?Hardware-based security protocols Keywords Synchronization; cryptography; quantum key distribution; data encryption; ; photon pulses. 1. INTRODUCTION Absolute privacy at transmitting data ... is the application of quantum keys in domestic telecommunication network data encryption. . 2.1 Self-compensation Quantum Key Distribution System With Phase Encoded ...
... level of IP networks [10]. Each node is responsible for data encryption before they come to the tunnel and their decoding after ...
12
February 2010
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 8, Downloads (Overall): 68
Full text available:
PDF
With the ever-increasing growth of data communication, the need for security and privacy has become a strong necessity. AES is a symmetric block cipher that is intended to replace DES as the approved standard for wide range of applications. Numbers of hardware techniques have been developed for implementation of AES ...
Keywords:
DES-data encryption standard, HDL-hardware description language, AES-advanced encryption standard
Keywords:
DES-data encryption standard
Full Text:
... TermsPerformance, Design, Economics, Reliability, Experimentation, Security,KeywordsAES- Advanced encryption standard, DES- Data encryption standard, HDL-Hardware Description Language.1. INTRODUCTIONThe cryptography applications in the epoch ...
13
December 1978
Communications of the ACM: Volume 21 Issue 12, Dec. 1978
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 5, Downloads (Overall): 178
Full text available:
PDF
Keywords:
authentication, data encryption standard, encryption, security, networks, protocols, public-key cryptosystems
Keywords:
data encryption standard
14
September 2015
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8, Downloads (12 Months): 96, Downloads (Overall): 221
The Internet of Things (IoT) is envisioned to digitize the physical world, resulting in a digital representation of our proximate living space. The possibility of inferring privacy violating information from IoT data necessitates adequate security measures regarding data storage and communication. To address these privacy and security concerns, we introduce ...
Keywords:
data security, internet of things, system design, computing on encrypted data, encrypted computing
Full Text:
... intuitive approach tocounter attacks on IoT data is to store data encrypted onthe Cloud database, with data en-/decryption performed atthe user-side. This, ...
15
April 2017
SAC '17: Proceedings of the Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 12, Downloads (12 Months): 16, Downloads (Overall): 16
Full text available:
PDF
Application-level data management middleware solutions are becoming increasingly compelling to deal with the complexity of a multi-cloud or federated cloud storage and multitenant storage architecture. However, these systems typically support traditional data mapping strategies that are created under the assumption of a fixed and rigorous database schema, and mapping data ...
Keywords:
cloud data storage, data encryption, multi-tenant SaaS, secure data management, NoSQL, untrusted clouds
Title:
Towards scalable and dynamic data encryption for multi-tenant SaaS
Keywords:
data encryption
Abstract:
... schema flexibility of NoSQL databases to accomplish dynamic and fine-grained data encryption in a more efficient and scalable manner. We illustrate these ...
References:
J. Hu and A. Klein. A benchmark of transparent data encryption for migration of web applications in the cloud. In Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on, pages 735--740, Dec 2009.
V. Sidorov et al. Transparent data encryption for data-in-use and data-at-rest in a cloud-based database-as-a-service solution. In 2015 IEEE World Congress on Services, pages 221--228, June 2015.
Full Text:
Towards Scalable and Dynamic Data Encryption for Multi-Tenant SaaSTowards Scalable and Dynamic Data Encryption forMulti-Tenant SaaSAnsar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosenimec-DistriNet, ... privacy ? Management and querying of encrypteddata;KeywordsCloud data storage, NoSQL, Data encryption, , Untrustedclouds, Secure data management, Multi-tenant SaaS1. INTRODUCTIONSoftware applications are ...
... in turn may af-fect the level of granularity at which data encryption is412to be applied2. As such, specific data encryption sup-port is required for applying encryption at differinglevels of granularity ... relatively relaxed confi-dentiality requirements, instead of applying full entity-encryption, partial data encryption (i.e. only encrypt-ing the sensitive information) is considered a more ... cryptographic key management infras-tructure, configuration dashboards to select differentalgorithms for data encryption (e.g., AES, RSA, etc.).R4. Scalable Data Encryption: : Encryption impacts ap-plication performance significantly [17], and scalabilityis a ...
... NoSQLdatabases such as Apache Cassandra to support efficient,dynamic, and scalable data encryption that can be enactedat different levels of granularity.This work fits ...
... 2007), pages 286?293, July 2007.[20] V. Sidorov et al. Transparent data encryption fordata-in-use and data-at-rest in a cloud-baseddatabase-as-a-service solution. In 2015 IEEE ...
16
March 2016
WIR '16: Proceedings of the ACM Symposium on Women in Research 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 47, Downloads (Overall): 47
Full text available:
PDF
Security is playing a very important and crucial role in the field of network communication system and Internet. Kerberos Authentication Protocol is designed and developed by Massachusetts Institute of Technology (MIT) and it provides authentication by encrypting information and allow clients to access servers in a secure manner. This paper ...
Keywords:
KDC (Key Distribution Center), DES (Data Encryption Standard), Client, Kerberos, Server
Keywords:
DES (Data Encryption Standard)
Abstract:
... This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides ...
Full Text:
... This paper describes the design and implementation of Kerberos using Data Encryption Standard (DES). Data encryption standard (DES) is a private key cryptography system that provides ... access as the back end are used for implementation.KeywordsKerberos; DES (Data Encryption Standard); KDC (KeyDistribution Center); Client; Server.1. INTRODUCTIONKerberos is named for ...
17
June 2015
SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8, Downloads (12 Months): 83, Downloads (Overall): 233
Full text available:
PDF
During the present era, mobiles and smart devices are in abundance. A number of services have been provided through these devices. Ubiquitous services is gaining popularity in the present era. Ubiquity in healthcare is a sector which has gained importance in the current decade, as medical costs are not affordable ...
Keywords:
access control, security monitoring, trusted computing, security, data encryption, cloud data security, patterns, access controls, cloud computing, cryptography
Keywords:
data encryption, cloud data security
Full Text:
... Security, E-Health Applications. Keywords Cloud computing; security; access controls; patterns; data encryption, , cloud data security; cryptography; security monitoring, trusted computing; access ...
18
December 2015
PPREW-5: Proceedings of the 5th Program Protection and Reverse Engineering Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11, Downloads (12 Months): 57, Downloads (Overall): 109
Full text available:
PDF
White-box cryptography sits at the intersection of software protection and cryptography. Software protection is aimed at preventing attackers from modifying software or extracting secrets from it through reverse-engineering or other means. Software protection becomes white-box cryptography when it is applied to software implementations of cryptographic algorithms.
Keywords:
Cryptography, Homomorphic Encryption, Software Protection, Advanced Encryption Standard, Differential Computation Analysis, Differential Fault Analysis, Reverse Engineering, Side Channels, Software Security Measures, Data Encryption Standard, Differential Power Analysis, Trusted Execution Environments, White-box Cryptography
Keywords:
Data Encryption Standard
Full Text:
... countermeasures Keywords White-box Cryptography; Software Protection; Cryptography; Advanced Encryption Standard; Data Encryption Standard; Reverse Engineering; Side Channels; Differential Fault Analysis; Differential Power ...
19
November 2007
ACM SIGGRAPH Computer Graphics: Volume 41 Issue 4, November 2007
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 6, Downloads (Overall): 421
Full text available:
Pdf
This article describes the development and implementation of a data compression algorithm designed specifically for fingerprints, referred to as GBP compression. The algorithm is herein discussed. Data Compression algorithms can be designed for general applications, meaning the input data is unknown. This is more commonly referred to as generic data. ...
Keywords:
automated fingerprint identification systems, compression, graphics, image compression, image quality, retrofitting, data encryption, data integrity, AFIS, data compression, limits of compression, portability, software engineering, compatibility, double compression, fingerprinting, serial compression
Keywords:
data encryption
Full Text:
... Standardization.KeywordsAFIS, Automated Fingerprint Identification Systems, Double Compression, Compatibility, Compression, DataCompression, Data Encryption, , Data Integrity, Fingerprinting, Graphics, Image Compression, Image Quality, Limitsof ...
... Image Compression ConsiderationsCompressing a picture usually involves some kind of data encryption; ; albeit, a known encoding method. Inimplementing all encryption algorithms, ...
20
November 2007
ACM SIGSOFT Software Engineering Notes: Volume 32 Issue 6, November 2007
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 2, Downloads (Overall): 475
Full text available:
PDF
This article describes the development and implementation of a data compression algorithm designed specifically for fingerprints, referred to as GBP compression. The algorithm is herein discussed. Data Compression algorithms can be designed for general applications, meaning the input data is unknown. This is more commonly referred to as generic data. ...
Keywords:
data encryption, data integrity, AFIS, data compression, limits of compression, portability, software engineering, compatibility, double compression, fingerprinting, serial compression, automated fingerprint identification systems, compression, graphics, image compression, image quality, retrofitting
Keywords:
data encryption
Full Text:
... Automated Fingerprint Identification Systems, Double Compression, Compatibility, Compression, Data Compression, Data Encryption, , Data Integrity, Fingerprinting, Graphics, Image Compression, Image Quality, Limits ...
... Compression Considerations Compressing a picture usually involves some kind of data encryption; ; albeit, a known encoding method. In implementing 13 This ...
Result page:
1
2
3
4
5
6
7
8
9
10
>>