Filters








27,246 Hits in 4.3 sec

Providing Receipt-Freeness in Mixnet-Based Voting Protocols [chapter]

Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
2004 Lecture Notes in Computer Science  
Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot.  ...  In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnetbased electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption  ...  Acknowledgements We acknowledge the support of the Australian government through ARC Linkage-International fellowship scheme 2003, Grant No: LX0346868.  ... 
doi:10.1007/978-3-540-24691-6_19 fatcat:ew2hux256nb5zayp5dhsdn5qwi

Page 1535 of Mathematical Reviews Vol. , Issue 2002B [page]

2002 Mathematical Reviews  
The National Institute of Standards and Tecnnology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come.  ...  The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science, nature, technology, and human culture  ... 

Page 3007 of Mathematical Reviews Vol. , Issue 2002D [page]

2002 Mathematical Reviews  
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come.  ...  Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA is behind the encryption in modern browsers.  ... 

Page 4631 of Mathematical Reviews Vol. , Issue 2002F [page]

2002 Mathematical Reviews  
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come.  ...  The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science, nature, technology, and human culture  ... 

Page 803 of Mathematical Reviews Vol. , Issue 2003A [page]

2003 Mathematical Reviews  
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come.  ...  Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA, is behind the encryption in modern browsers.  ... 

Page 7040 of Mathematical Reviews Vol. , Issue 2002I [page]

2002 Mathematical Reviews  
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come.  ...  Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA. 1s behind the encryption in modern browsers.  ... 

Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards

Geethapriya Venkataramani, Srividya Gopalan
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Online shopping using electronic payment scheme has gained a lot of popularity in recent years.  ...  In an electronic payment scheme using normal credit cards there is no way to genuinely identify owner of the credit card. Credit card fraud is the fastest growing crime all over the world.  ...  Acknowledgements We like to thank Mr.Gopi.K.L of Satyam Computer Services Limited, for his valuable inputs and reviews.  ... 
doi:10.1109/ares.2007.105 dblp:conf/IEEEares/VenkataramaniG07 fatcat:epcdejciargabh23fnkkkvbha4

An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records

Ömer Kasım
2022 ˜The œinternational Arab journal of information technology  
Electronic medical records, one of the sensitive data, are stored in public or private cloud service providers.  ...  In the middleware architecture proposed in this study, access control protocol, key distributor and end-to-end hybrid encryption which are based on user roles were innovatively used to overcome security  ...  In these studies, the data collector is allowed to publish the data records instead of publishing the query results.  ... 
doi:10.34028/iajit/19/2/14 fatcat:oeg2ficbenhu3l7q4765ua37im

Page 8794 of Mathematical Reviews Vol. , Issue 2002K [page]

2002 Mathematical Reviews  
The National Institute of Standards and Technology recently adopted an Advanced Encryption th rough Fractals Standard chat will be used for electronic communication in the years to come.  ...  The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science, nature, technology, and human culture  ... 

Privacy Preserving and Sensitive Attribute Based Cloud Storage: A Survey [chapter]

Muthulakshmi K, Valarmathi K
2020 Advances in Parallel Computing  
Cloud computing is a recent methodology to store and retrieve huge volume of data in a cost effective way. Distributed computing undertakes security to the system as its main role.  ...  This Survey paper portrays the thought of Searchable encryption (SE) with regards to human services applications and portrays the SE use cases into four situations in health care.  ...  ., [7] proposed the work of a sensitive and energetic access control (SE-AC) for electronic health record in the cloud. It maintains confidentiality of patient's data and fine gained control.  ... 
doi:10.3233/apc200156 fatcat:gguc2zm2ubfxzequ5ydlsin2lq

A Secure Cloud Based Chatting Application with Hybrid Cryptography

Sanjana Awachat, Ashwini Chahande, Sakshi Gadge, Snehal Shastrakar, Karishma Gajbhiye
2021 International journal of computational and electronics aspects in engineering  
The purpose of the proposed system is to build an encryption system that can encrypts a data and decrypts the data transmitted from mobile to cloud efficiently.  ...  During this system can show system for encrypting mobile to cloud data. In this system, we will help the encryption algorithm. There are multiple hybrid encryption algorithms are used.  ...  and Electronic Aspects in Engineering, RAME Publishers, vol. 2, issue 2, pp. 42-45, 2021.  ... 
doi:10.26706/ijceae.2.2.20210413 fatcat:j4c4otu475bijav2v6kpdijtaa

E-Voting Protocol Based On Public-Key Cryptography

Hayam K Al Anie, Mohammad A. Alia, Adnan A. Hnaif
2011 International journal of network security and its applications  
The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial.  ...  In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem.  ...  Acknowledgment The authors would like to thank Al Zaytoonah University of Jordan for supporting this study.  ... 
doi:10.5121/ijnsa.2011.3408 fatcat:2s56bhtdfbe5lfmhb22cnwa7xa

CPR Verification Analysis Based on TSA

Zhi-qiang LIU
2019 DEStech Transactions on Computer Science and Engineering  
This scheme encrypts the digital digest of the electronic medical record by means of digital signature, which can reduce the dependence on the communication bandwidth while encrypting.  ...  Through the analysis of the anti-attack ability, we can see that based on the context correlation of timestamp chain, this scheme can effectively prevent the modification of the content of electronic medical  ...  With the development and popularization of network technology, digital signature will play a more important role. Digital certificates are encrypted asymmetrically, i.e. public key system.  ... 
doi:10.12783/dtcse/cscme2019/32557 fatcat:exmur7lwyjfx5p7omklseyq6ve

A survey of encryption standards

B. Kaliski
1993 IEEE Micro  
Numerous encryption standards dot the microcomputer landscape, seemingly covering every application. One nevertheless h d s much common ground underlying the many standards.  ...  In its broadest sense cryptography addresses a number of practical problems: Burt Kaliski RSA Laboratories confidentiality, keeping messages secret; origin authentication, verlfying a message's source;  ...  Although many of the standards specfy much more than just cryptography, encryption plays an important role.  ... 
doi:10.1109/40.248057 fatcat:pio7rznzbneytnuxsrrd5mne4e

Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer [chapter]

Byoungcheon Lee, Kwangjo Kim
2003 Lecture Notes in Computer Science  
We investigate the receipt-freeness issue of electronic voting protocols. Receipt-freeness means that a voter neither obtains nor is able to construct a receipt proving the content of his vote.  ...  In this paper we extend [Hirt01] such that a tamper-resistant randomizer (TRR), a secure hardware device such as smart card or Java card, replaces the role of third-party randomizer and untappable channel  ...  There was a comment (and we agree) that the proof of difference may leak some information of voter's vote, more than just the fact of difference.  ... 
doi:10.1007/3-540-36552-4_27 fatcat:k434ah3z4rf7ln4ghwxeytjsza
« Previous Showing results 1 — 15 out of 27,246 results