492 Hits in 6.4 sec

RAON-RB: A Verifiable Randomized Non-Separable Encryption Scheme for Secure Cloud Storage

Fatty M., Mohamed Osman
2017 International Journal of Computer Applications  
The proposed scheme is secure even if all but one storage servers have been compromised and even if the encryption key is disclosed.  ...  , and with the aid of the salting technique, called Replicated BYTE, integrity is ensured.  ...  Furthermore, the scheme remains secure even with the disclosure of the encryption key.  ... 
doi:10.5120/ijca2017915966 fatcat:byxsxdxwgfhydloddbr3k7qbym

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream [chapter]

Tieyan Li, Huafei Zhu, Yongdong Wu
2005 Lecture Notes in Computer Science  
Our analysis shows that the scheme is secure and efficient.  ...  Stream authentication is more complex since a stream may consist of multiple sources and be transcoded by intermediate proxies.  ...  The scheme works under the general assumption of "erasure channel", but can be adapted to "polluted erasure channel", e.g. by using distillation code [17] .  ... 
doi:10.1007/11602897_33 fatcat:ta3433bulnc73aboeklnc3a6yy

Falcon Codes

Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
For instance, one variant works well with small input messages (100s of KB to 10s of MB), but two other variants are designed to handle much larger messages (several GB).  ...  Through judicious use of simple cryptographic tools at the core LT-coding level, Falcon codes lend themselves to secure extensions of any LT-based fountain code, in particular providing Raptor codes that  ...  We thank Charalampos Papamanthou and Elaine Shi for providing help and feedback on the application of Falcon codes to their PoR scheme [45] , as well as reference code for use in benchmarks.  ... 
doi:10.1145/2810103.2813728 dblp:conf/ccs/JuelsKTT15 fatcat:543brrm6nrdmljnlcu2zfio5we

Cross-Layer Quality Assessment of Scalable Video Services on Mobile Embedded Systems

Kyungtae Kang, Won J. Jeon, Kyung-Joon Park, Roy H. Campbell, Klara Nahrstedt
2010 IEEE Transactions on Mobile Computing  
key system metrics and the quality of the video stream as it is perceived by users.  ...  The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users.  ...  The broadcast security protocol encrypts contents to cope with the threat of a user obtaining unauthorized access to a particular content stream.  ... 
doi:10.1109/tmc.2010.119 fatcat:izmhwl6ebzhwloykboiqlipebi

Authenticated error-correcting codes with applications to multicast authentication

Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos
2010 ACM Transactions on Privacy and Security  
Allows authenticated, encrypted, and nonsecure phones to register with Cisco keys after users successfully enter the authentication code and complete the enrollment process.  ...  AND ANALYSIS OF AUTHENTICATED REMOTE LOGIN SCHEMES, DR.  ... 
doi:10.1145/1698750.1698757 fatcat:avu4i6ppzbhabbe5opv5dhztxa

Scalable authentication of MPEG-4 streams

Yongdong Wu, R.H. Deng
2006 IEEE transactions on multimedia  
All the schemes allow authentication of MPEG-4 streams over lossy networks by integrating seamlessly digital signatures and erasure correction coding with MPEG-4's fine granular scalability.  ...  of any down-scaled version of the original signed object group.  ...  [12] provided a method for scalable encryption of MPEG-4 streams. Venkatramani et al. [13] designed ARMS so as to provide secure end-to-end MPEG-4 based streaming.  ... 
doi:10.1109/tmm.2005.861283 fatcat:u2vvjxwawzge7fjdmm5eamcqqu

Secure Storing and Sharing of Cloud Data under Key Exposure: A Survey

Deepa Chandran P
2020 International Journal for Research in Applied Science and Engineering Technology  
The Cloud is prone to many privacy and security attacks. The largest obstacle hindering the development and also the wide adoption of the Cloud is that the privacy and security issues related to it.  ...  key, will still compromise single server and rewrite the cipher text keep therein.  ...  In Case of stream cipher one bit is encrypted at a specific time.  ... 
doi:10.22214/ijraset.2020.6147 fatcat:mrtbesbypjazdh7icq6uwyrfjy

Securing Big Data systems, A cybersecurity management discussion [article]

Shakir A. Almasaari
2019 arXiv   pre-print
Big data platform stems its complexity from being a collection of interrelated non-standardized systems that interact with each other to process large data-sets.  ...  This complexity increases the chances of overlooking critical cybersecurity management practices. The paper discusses various security management for each part of big data systems.  ...  Third, all encryption processing (such as key generation and activation) should be properly logged to enable security auditing on the encryption activities.  ... 
arXiv:1912.08191v1 fatcat:o27rftworne5fmqtjjahwvtb6e

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Michael J. Pelosi, Nimesh Poudel, Pratap Lamichhane, Danyal Badar Soomro
2018 Advances in Science, Technology and Engineering Systems  
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology.  ...  Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image  ...  Conflict of Interest The authors declare no conflict of interest regarding the publication of this paper.  ... 
doi:10.25046/aj030232 fatcat:7ix3vxtehrfajiwywh6rkvsfqy

D5.11 M-Sec GDPR compliance assessment report

Vanessa Clemente, Sonia Sotero, Arturo Medela, Keiko Doguchi, Mathieu Gallissot, Takehiro Kitanot, Tadashi Okoshi, Jin Nakasawa, Akira Tsuge, Orfeas Voutyras, George Palaiokrassas
2020 Zenodo  
The specific report describes the compliance of the M-Sec findings and approach with European General Data Protection Regulation, dealing with the planning, monitoring and management of ethics issues in  ...  Both keys have a mathematical relationship by virtue of which the private key can decrypt data that has been encrypted through the public key.  ...  personal data. 2.Encryption: Where the data is encrypted, the holder of the key can still re-identify each data subject through decryption.  ... 
doi:10.5281/zenodo.4237763 fatcat:vckurnpk5bbnzchcore2qpkkve

Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction

Chi-Huang Shih, Yeong-Yuh Xu, Yao-Tien Wang
2012 International Journal of Digital Multimedia Broadcasting  
Experimental results demonstrate that the proposed scheme obtains similar performance compared with the joint encryption and FEC scheme.  ...  With the wide deployment of Internet Protocol (IP) infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV) has emerged as one of the major multimedia access techniques  ...  Standard FEC Without loss of generality, we use systematic Reed-Solomon erasure codes RS (n, k 1 ) to protect multimedia data from channel losses.  ... 
doi:10.1155/2012/720791 fatcat:r6hhzzmp65hthbydp2rnquoe2y

Variations on the McEliece Public Key Cryptoystem [chapter]

Martin Tomlinson, Cen Jung Tjhai, Marcel A. Ambroze, Mohammed Ahmed, Mubarak Jibril
2017 Signals and Communication Technology  
Effectively the message is encrypted with a stream cipher prior to encoding.  ...  This is important because to achieve 256 bits of security, the security analysis has shown that the system needs to be based on Goppa codes of length 8192 bits.  ... 
doi:10.1007/978-3-319-51103-0_19 fatcat:rna6ku3brnhr5g23h5wg7a7m7e

Authentication of spatio-textual similarity join queries in untrusted cloud environments

Han Yan, Xiang Cheng, Dezheng Wang, Sen Su, Qiying Zhang
2016 Security and Communication Networks  
on structurepreserving encryption for on-demand increased confidentiality with controllable performance degradation.  ...  We contribute an analysis of operators executing in map-reduce or map-carryreduce phases and derive performance statistics.  ...  We would like to thank the Free University of Bolzano, Italy, for designing the Bobo Raspberry-π cluster and making it available to the community 2 .  ... 
doi:10.1002/sec.1714 fatcat:bzf2buqi2zal7brhjq7kdwacka

Coding for Cryptographic Security Enhancement Using Stopping Sets

Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros
2011 IEEE Transactions on Information Forensics and Security  
We further extend security analysis to models with multiple receivers and collaborative attackers.  ...  The system setup is the wiretap channel model where transmitted data traverse through independent packet erasure channels with public feedback for authenticated ARQ (Automatic Repeat reQuest).  ...  If a secret message M is encrypted into a cryptogram E using a secret key K, then perfect secrecy is achieved if H(M |E) = H(M ).  ... 
doi:10.1109/tifs.2011.2145371 fatcat:xh3kvdoi2zaazbp5rqqbg3463i

Data protection by means of fragmentation in various different distributed storage systems - a survey [article]

Katarzyna Kapusta, Gerard Memmi
2017 arXiv   pre-print
Those having structured input data with predefined confidentiality level and disposing of a heterogeneous environment in terms of machine trustworthiness were classified as structurewise.  ...  This paper analyzes various distributed storage systems that use data fragmentation and dispersal as a way of protection.Existing solutions have been organized into two categories: bitwise and structurewise  ...  key from hash • OAEP encryption • hashing data • systematic Reed-Solomon n(d+H) k + K Yes Yes AONT-RS Computational Cost of: • AES encryption • hashing data • systematic Reed-Solomon  ... 
arXiv:1706.05960v1 fatcat:eigwwhaegjb7fl4z2yazxbzhjm
« Previous Showing results 1 — 15 out of 492 results