• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,732
Next 10 →

Multiuser cryptographic techniques

by Whitfield Diffie, Martin E. Hellman - In Proceedings of the June 7-10, 1976, national computer conference and exposition , 1976
"... This paper deals with new problems which arise in the application of cryptography to computer commu-nication systems with large numbers of users. Fore-most among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and r ..."
Abstract - Cited by 65 (1 self) - Add to MetaCart
This paper deals with new problems which arise in the application of cryptography to computer commu-nication systems with large numbers of users. Fore-most among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology

Design, Analysis and Applications of Cryptographic Techniques

by Chan Yeob Yeun , 2001
"... Cryptographic techniques, such as encipherment, digital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In this thesis, we present a general model for online secret sharing schemes and investigate the design of onl ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Cryptographic techniques, such as encipherment, digital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In this thesis, we present a general model for online secret sharing schemes and investigate the design

Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing

by Jissy Ann George, Dr. M. Hemalatha
"... Abstract — Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt da ..."
Abstract - Add to MetaCart
Abstract — Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt

Cryptographic Techniques in Statistical Data Protection

by Josep Domingo-ferrer, Josep M. Mateo-sanz, Ricardo X. Sánchez del Castillo, Ricardo X, Sanchez Del Castillo - In Proc. Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality 159–166. Office for Official Publications of the European Communities , 2000
"... Statistical data protection is a broad concept that encompasses all aspects of the protection of confidential statistical data. Statistical... This paper identifies some of these problems and sketches cryptographic solutions for them. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Statistical data protection is a broad concept that encompasses all aspects of the protection of confidential statistical data. Statistical... This paper identifies some of these problems and sketches cryptographic solutions for them.

Classification of Cryptographic Techniques in Authentication Protocols

by Wenbo Mao, Colin Boyd - In Proceedings 1994 Workshop on Selected Areas in Cryptography
"... In many published authentication protocols, the cryptographic services are coarsely specified in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a found ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In many published authentication protocols, the cryptographic services are coarsely specified in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a

Cryptographic Technique: Base Change Method

by Prabhas Tiwari, Hamdard Nagar, New Delhi, Nishtha Madaan, Hamdard Nagar, New Delhi, Md. Tabrez Nafis, Hamdard Nagar, New Delhi
"... Cryptography is the study of cryptographic algorithms that include encryption and decryption both. The importance of cryptography is discussed. The problem statement here is, to form a cryptographic algorithm that uses randomization. Usage of high amount of randomization makes it tougher for one to ..."
Abstract - Add to MetaCart
Cryptography is the study of cryptographic algorithms that include encryption and decryption both. The importance of cryptography is discussed. The problem statement here is, to form a cryptographic algorithm that uses randomization. Usage of high amount of randomization makes it tougher for one

Comparative Study on Various Cryptographic Techniques

by K. B. Priya Iyer, Ph. D, R. Anusha, R. Shakthi Priya
"... In today’s world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over our system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used ..."
Abstract - Add to MetaCart
is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format called cipher text. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. The main objective

Cryptographic Techniques for Privacy Preserving Identity

by John Bethencourt, John Daniel Bethencourt, John Daniel Bethencourt
"... All rights reserved. ..."
Abstract - Add to MetaCart
All rights reserved.

SECURITY BASED ON CRYPTOGRAPHIC TECHNIQUES FOR REMOTE CONTROL SYSTEMS

by Bogdan Groza, Dorina Petrica, Toma-leonida Dragomir
"... Abstract: Security based on cryptographic techniques is commonly used in many applications from many fields. Using security based on cryptographic techniques in remote control systems is certainly a subject of great interest. This paper will try to bring some points of view on the security objective ..."
Abstract - Add to MetaCart
Abstract: Security based on cryptographic techniques is commonly used in many applications from many fields. Using security based on cryptographic techniques in remote control systems is certainly a subject of great interest. This paper will try to bring some points of view on the security

Cryptographic Techniques for Privacy-Preserving Data Mining

by Benny Pinkas - SIGKDD Explorations , 2002
"... Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything ..."
Abstract - Cited by 92 (0 self) - Add to MetaCart
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. These results were shown using generic constructions that can be applied to any function that has an ecient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. We also show examples of secure computation of data mining algorithms that use these generic constructions.
Next 10 →
Results 1 - 10 of 2,732
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University