Filters








182 Hits in 3.2 sec

Page 5993 of Mathematical Reviews Vol. , Issue 2000h [page]

2000 Mathematical Reviews  
Baras, An information-theoretic analysis of rooted-tree based secure multicast key distribution schemes (624-638).  ...  generation (extended abstract) (116-129); Masayuki Abe, Robust distributed multiplication without interaction (130-147); Berry Schoenmakers, A simple publicly verifiable secret sharing scheme and its  ... 

On the Security Goals of White-Box Cryptography

Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Based on our proposed notion for hardware-binding, we describe a possible white-box competition setup which assesses white-box implementations w.r.t. hardware-binding.  ...  We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box  ...  White-box cryptography here shall prevent the user from extracting the secret key and sharing it with other users.  ... 
doi:10.46586/tches.v2020.i2.327-357 fatcat:6tak7t7jnrapxk6ugufwndmgsy

On the Security Goals of White-Box Cryptography

Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Based on our proposed notion for hardware-binding, we describe a possible white-box competition setup which assesses white-box implementations w.r.t. hardware-binding.  ...  We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box  ...  White-box cryptography here shall prevent the user from extracting the secret key and sharing it with other users.  ... 
doi:10.13154/tches.v2020.i2.327-357 dblp:journals/tches/BockABM20 fatcat:noyasbtnnvb3li4xihc3mthyei

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy  ...  The ciphertext can be decrypted with the decryption key if and only if the attribute set of ciphertext satisfies the access structure of decryption key. [12], [27] CP-ABE: In a CP-ABE scheme, on the contrary  ...  On cloud health service, users from various distributed computers can send and share the data in it.  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch, Bjorn Scheuermann
2016 IEEE Communications Surveys and Tutorials  
As we show and discuss, many key ideas are likewise applicable in various other fields, so that their impact reaches far beyond Bitcoin itself.  ...  The authors would like to thank Daniel Cagara for the discussions on this topic and for sharing his practical experience.  ...  The idea comes directly from secret sharing [Shamir 1979 ]: the secret, in this case the private key, is split into shares.  ... 
doi:10.1109/comst.2016.2535718 fatcat:xmdaafdgsvc6tam2kzmaeyorta

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network.  ...  We start with fundamental working principles of blockchains and how blockchain-based systems achieve the characteristics of decentralization, security, and auditability.  ...  [119] presented one of the earlier pre-blockchain solutions for decentralized anonymous authentication, based on cryptographic Zero-Knowledge Proof of Knowledge (ZKPK).  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
Conclusion: This review has revealed that (a) most of the state of the art is focussed on preventive and detective countermeasures and significant research is required on developing investigative countermeasures  ...  Context: One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity.  ...  a secret key as the seed.  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

Recent Advances in Multimedia Information System Security

Shiguo Lian, France Telecom, Dimitris Kanellopoulos, Giancarlo Ruffo
2009 Informatica   unpublished
It reviews the latest security solutions such as Digital Rights Management (DRM), confidentiality protection, ownership protection, traitor tracing, secure multimedia distribution based on watermarking  ...  A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on.  ...  Fingerprinting and DRM The fingerprinting based traitor tracing scheme can be combined with existing Digital Rights Management (DRM) systems in order improve the traceability.  ... 
fatcat:ptvlfbjqqnhcxntahwd2kureui

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Fingerprinting and DRM The fingerprinting based traitor tracing scheme can be combined with existing Digital Rights Management (DRM) systems in order improve the traceability.  ...  On one hand, based on the analysis of encrypting different key data, it can guide us to design good combinations of key data encryption, and then design selective encryption algorithms of high visual security  ...  Since the model is based on purely morphotactic distributional regularities, potential phonological phenomena are expressed using exclusively allomorphic variations, i.e. alternative sets of allomorphs  ... 
fatcat:ekua3zeo5rfnvcycdaxfmhjihq

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant  ...  Acknowledgments The research work was supported by New Century Excellent Talents Acknowledgments The work described in this paper was supported by the Key program of National Science Fund of Tianjin  ...  We distribute modified pixel pair among dual stego image, stego major (SM) and stego auxiliary (SA) based on shared secret key bit stream. The secret message bits are distributed among dual image.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

Branded in his Mind: Trauma, Violence and Memory in E. L. Doctorow's The Book of Daniel1

María Ferrández
2014 NJES: Nordic Journal of English studies  
This paper examines the protagonist's traumatic condition, concentrating on its causes and on the determining circumstances that contribute to aggravating it.  ...  Finally, this paper concentrates on the status of Daniel's memories of his traumatic past.  ...  It broadcasts on a secret frequency directly to my father in his jail cell" (149).  ... 
doi:10.35360/njes.330 fatcat:gcuqsgu2lnbfvlk3p5dywlhbpa

Accountable infrastructure and its impact on internet security and privacy [article]

Milivoj Simeonovski, Universität Des Saarlandes, Universität Des Saarlandes
2019
This element is used by each node   on the path to derive a secret that is shared with the user and is used to extract a set of (session) keys for encryption and integrity protection.  ...  [119] studied dependences among providers based on shared X.509 certificates, and its implications on the HTTPS ecosystem security.  ...  For example, according to Metric #2, the United States hosts 47K JS hosting providers (see Table 5 .2(b)) which could distribute malicious code to about 16% of the top 100K Alexa domains.  ... 
doi:10.22028/d291-29890 fatcat:p32unxdvirgn5gdmqsfzvur6aq

*Inform atica An International Journal of Computing and Informatics pecial Issue: Cryptology and Network Security Guest Editors

Francesco Bergadano, Chuan-Kun Wu
2002 unpublished
secret key k.  ...  Multisecret Sharing Immune Against Cheating by-Josef Pieprzyk and Xian-Mo Zhang Secret sharing being a means of secret key management has been proposed for many years.  ...  GF^ is the gain factor based on the number of developers WD is the vvorking day at each site (it is assumed that the working day at ali sites has the same value).  ... 
fatcat:vhqpwpgjyreipdpafwxoiu6qy4

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
electronic data storage and high transfer based devices, e-commerce, e-security, e-governance, and e-business.  ...  Biometric recognition is discussed in detail wit pros and cons of the approach as a key e-security solution.  ...  All theses tools are based on the well-known polynomial/Shamir's secret sharing scheme.  ... 
fatcat:c2q6cwnb6vapbixa3b4ublzf3a

The State of AI Ethics Report (Volume 5) [article]

Abhishek Gupta
2021 arXiv   pre-print
Given MAIEI's mission to highlight scholars from around the world working on AI ethics issues, the report also features two spotlights sharing the work of scholars operating in Singapore and Mexico helping  ...  The report also features special contributions on the subject of pedagogy in AI ethics, sociology and AI ethics, and organizational challenges to implementing AI ethics in practice.  ...  distribution.  ... 
arXiv:2108.03929v1 fatcat:rhc6bdeesbaqjlnlu4x5iyesay
« Previous Showing results 1 — 15 out of 182 results