A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography
[article]
2021
figshare.com
Then we will discuss about their advantages and disadvantages and we will introduce a new method which it can solve the "chaff and winnowing" method's semantic challenges and make cryptography method safer ...
Thus we want to introduce a new and secure method in network security. In this article at first we will survey" chaff and winnowing" method and cryptography method. ...
Conclusion: In this paper we present a new method for enhancing the security for confidentiality and authentication. This approach can solve the semantic problem of chaff and winnowing method. ...
doi:10.6084/m9.figshare.14348066.v1
fatcat:rnycurrzmjhq5ok5p4wd545hh4
Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography
2020
Zenodo
UDGs are used for modelling Ad-Hoc networks and finding MDS in such graphs is a promising approach to clustering the wireless Ad-Hoc networks. The MDS problem is proved to be NP-complete. ...
In this paper, we use Genetic Algorithms to find the Minimum Dominating Set (MDS) of Unit Disk Graphs (UDG). ...
This approach can solve the semantic problem of chaff and winnowing method. Also the new presented method use the "chaff and winnowing" and "encryption" advantages to enhance the security level. ...
doi:10.5281/zenodo.3788102
fatcat:46kxanirafduzptjxwtznefg5y
POTSHARDS—a secure, recoverable, long-term archival storage system
2009
ACM Transactions on Storage
Secrecy is achieved by using unconditionally secure secret splitting and spreading the resulting shares across separately managed archives. ...
Providing availability and data recovery in such a system can be difficult; thus, we use a new technique, approximate pointers, in conjunction with secure distributed RAID techniques to provide availability ...
ACKNOWLEDGMENTS We would like to thank our colleagues in the Storage Systems Research Center (SSRC) who provided valuable feedback on the ideas in this article. ...
doi:10.1145/1534912.1534914
fatcat:jvezhkkqkbeqzo6g27i4kz2xra
Privacy on the line: the politics of wiretapping and encryption
1998
ChoiceReviews
Widespread deployment of cryptography in the "command and control" of the civilian infrastructure would solve both problems. ...
This problem appears to have been solved for US government cryptosystems by the 1960s, permitting formerly encrypted messages to be declassified on the basis of content alone. ...
Notes Chapter 1: Introduction 379 Brooks, Clinton, 78, 83, 205, 231, 348 Brooks, Jack, 346 and in 1940s, 156-158 in 1950s, 159 in 1960s, 159-165 in 1970s and 1980s, 165-167 in 1990s, 169 in American ...
doi:10.5860/choice.35-6456
fatcat:zlca7qql2ffevobnzs5qckmyqq
Verifying security protocols as planning in logic programming
2001
ACM Transactions on Computational Logic
In AL SP we can give a declarative specification of a protocol with the natural semantics of send and receive actions which can be performed in parallel. ...
AL SP is based on logic programming with negation as failure, and with stable model semantics. ...
Baumgartner and U. Furbach for many useful comments on an earlier formalization of this work, I. Niemel ä and T. Syrj änen for support ...
doi:10.1145/383779.383785
fatcat:hdkoyg3mhbbbpdkqyshkn3wjsq
Enhancing user privacy in web services
2018
The full abstract for this thesis is available in the body of the thesis, and will be available when the embargo expires. ...
While a human may be able to inspect all of the keys for a given identity in the PGP database and winnow the legitimate keys from the chaff, properly identifying legitimate keys programmatically in an ...
Some use it to solve a form of data lock-in [15, 128] , by empowering users to place data in personal stores in the cloud. ...
doi:10.14288/1.0358013
fatcat:egmn42i4lrgghnjjvy5yya7egu