A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Providing Receipt-Freeness in Mixnet-Based Voting Protocols
[chapter]
2004
Lecture Notes in Computer Science
Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. ...
In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnetbased electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption ...
Acknowledgements We acknowledge the support of the Australian government through ARC Linkage-International fellowship scheme 2003, Grant No: LX0346868. ...
doi:10.1007/978-3-540-24691-6_19
fatcat:ew2hux256nb5zayp5dhsdn5qwi
Page 1535 of Mathematical Reviews Vol. , Issue 2002B
[page]
2002
Mathematical Reviews
The National Institute of Standards and Tecnnology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come. ...
The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science,
nature, technology, and human culture ...
Page 3007 of Mathematical Reviews Vol. , Issue 2002D
[page]
2002
Mathematical Reviews
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come. ...
Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA is behind the encryption in modern browsers. ...
Page 4631 of Mathematical Reviews Vol. , Issue 2002F
[page]
2002
Mathematical Reviews
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come. ...
The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science,
nature, technology, and human culture ...
Page 803 of Mathematical Reviews Vol. , Issue 2003A
[page]
2003
Mathematical Reviews
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come. ...
Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA, is behind the encryption in modern browsers. ...
Page 7040 of Mathematical Reviews Vol. , Issue 2002I
[page]
2002
Mathematical Reviews
The National Institute of Standards and Technology recently adopted an Advanced Encryption Standard that will be used for electronic communication in the years to come. ...
Public key encryption allows a user to publish the encryption key for all to use, while keeping the decryption key secret. One such algorithm, called RSA. 1s behind the encryption in modern browsers. ...
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards
2007
The Second International Conference on Availability, Reliability and Security (ARES'07)
Online shopping using electronic payment scheme has gained a lot of popularity in recent years. ...
In an electronic payment scheme using normal credit cards there is no way to genuinely identify owner of the credit card. Credit card fraud is the fastest growing crime all over the world. ...
Acknowledgements We like to thank Mr.Gopi.K.L of Satyam Computer Services Limited, for his valuable inputs and reviews. ...
doi:10.1109/ares.2007.105
dblp:conf/IEEEares/VenkataramaniG07
fatcat:epcdejciargabh23fnkkkvbha4
An Efficient Ensemble Architecture for Privacy and Security of Electronic Medical Records
2022
˜The œinternational Arab journal of information technology
Electronic medical records, one of the sensitive data, are stored in public or private cloud service providers. ...
In the middleware architecture proposed in this study, access control protocol, key distributor and end-to-end hybrid encryption which are based on user roles were innovatively used to overcome security ...
In these studies, the data collector is allowed to publish the data records instead of publishing the query results. ...
doi:10.34028/iajit/19/2/14
fatcat:oeg2ficbenhu3l7q4765ua37im
Page 8794 of Mathematical Reviews Vol. , Issue 2002K
[page]
2002
Mathematical Reviews
The National Institute of Standards and Technology recently adopted an Advanced Encryption th rough Fractals Standard chat will be used for electronic communication in the years to come. ...
The Mathematical Moments program is a series of illustrated “snapshots” designed to promote appreciation and understanding of the role mathematics plays in science, nature, technology, and human culture ...
Privacy Preserving and Sensitive Attribute Based Cloud Storage: A Survey
[chapter]
2020
Advances in Parallel Computing
Cloud computing is a recent methodology to store and retrieve huge volume of data in a cost effective way. Distributed computing undertakes security to the system as its main role. ...
This Survey paper portrays the thought of Searchable encryption (SE) with regards to human services applications and portrays the SE use cases into four situations in health care. ...
., [7] proposed the work of a sensitive and energetic access control (SE-AC) for electronic health record in the cloud. It maintains confidentiality of patient's data and fine gained control. ...
doi:10.3233/apc200156
fatcat:gguc2zm2ubfxzequ5ydlsin2lq
A Secure Cloud Based Chatting Application with Hybrid Cryptography
2021
International journal of computational and electronics aspects in engineering
The purpose of the proposed system is to build an encryption system that can encrypts a data and decrypts the data transmitted from mobile to cloud efficiently. ...
During this system can show system for encrypting mobile to cloud data. In this system, we will help the encryption algorithm. There are multiple hybrid encryption algorithms are used. ...
and Electronic Aspects in Engineering, RAME Publishers,
vol. 2, issue 2, pp. 42-45, 2021. ...
doi:10.26706/ijceae.2.2.20210413
fatcat:j4c4otu475bijav2v6kpdijtaa
E-Voting Protocol Based On Public-Key Cryptography
2011
International journal of network security and its applications
The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial. ...
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. ...
Acknowledgment The authors would like to thank Al Zaytoonah University of Jordan for supporting this study. ...
doi:10.5121/ijnsa.2011.3408
fatcat:2s56bhtdfbe5lfmhb22cnwa7xa
CPR Verification Analysis Based on TSA
2019
DEStech Transactions on Computer Science and Engineering
This scheme encrypts the digital digest of the electronic medical record by means of digital signature, which can reduce the dependence on the communication bandwidth while encrypting. ...
Through the analysis of the anti-attack ability, we can see that based on the context correlation of timestamp chain, this scheme can effectively prevent the modification of the content of electronic medical ...
With the development and popularization of network technology, digital signature will play a more important role. Digital certificates are encrypted asymmetrically, i.e. public key system. ...
doi:10.12783/dtcse/cscme2019/32557
fatcat:exmur7lwyjfx5p7omklseyq6ve
A survey of encryption standards
1993
IEEE Micro
Numerous encryption standards dot the microcomputer landscape, seemingly covering every application. One nevertheless h d s much common ground underlying the many standards. ...
In its broadest sense cryptography addresses a number of practical problems: Burt Kaliski RSA Laboratories confidentiality, keeping messages secret; origin authentication, verlfying a message's source; ...
Although many of the standards specfy much more than just cryptography, encryption plays an important role. ...
doi:10.1109/40.248057
fatcat:pio7rznzbneytnuxsrrd5mne4e
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer
[chapter]
2003
Lecture Notes in Computer Science
We investigate the receipt-freeness issue of electronic voting protocols. Receipt-freeness means that a voter neither obtains nor is able to construct a receipt proving the content of his vote. ...
In this paper we extend [Hirt01] such that a tamper-resistant randomizer (TRR), a secure hardware device such as smart card or Java card, replaces the role of third-party randomizer and untappable channel ...
There was a comment (and we agree) that the proof of difference may leak some information of voter's vote, more than just the fact of difference. ...
doi:10.1007/3-540-36552-4_27
fatcat:k434ah3z4rf7ln4ghwxeytjsza
« Previous
Showing results 1 — 15 out of 27,246 results