Results 1 - 10
of
2,732
Multiuser cryptographic techniques
- In Proceedings of the June 7-10, 1976, national computer conference and exposition
, 1976
"... This paper deals with new problems which arise in the application of cryptography to computer commu-nication systems with large numbers of users. Fore-most among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and r ..."
Abstract
-
Cited by 65 (1 self)
- Add to MetaCart
This paper deals with new problems which arise in the application of cryptography to computer commu-nication systems with large numbers of users. Fore-most among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology
Design, Analysis and Applications of Cryptographic Techniques
, 2001
"... Cryptographic techniques, such as encipherment, digital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In this thesis, we present a general model for online secret sharing schemes and investigate the design of onl ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Cryptographic techniques, such as encipherment, digital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In this thesis, we present a general model for online secret sharing schemes and investigate the design
Cryptographic Techniques, Threats and Privacy Challenges in Cloud Computing
"... Abstract — Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt da ..."
Abstract
- Add to MetaCart
Abstract — Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt
Cryptographic Techniques in Statistical Data Protection
- In Proc. Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality 159–166. Office for Official Publications of the European Communities
, 2000
"... Statistical data protection is a broad concept that encompasses all aspects of the protection of confidential statistical data. Statistical... This paper identifies some of these problems and sketches cryptographic solutions for them. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Statistical data protection is a broad concept that encompasses all aspects of the protection of confidential statistical data. Statistical... This paper identifies some of these problems and sketches cryptographic solutions for them.
Classification of Cryptographic Techniques in Authentication Protocols
- In Proceedings 1994 Workshop on Selected Areas in Cryptography
"... In many published authentication protocols, the cryptographic services are coarsely specified in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a found ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In many published authentication protocols, the cryptographic services are coarsely specified in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a
Cryptographic Technique: Base Change Method
"... Cryptography is the study of cryptographic algorithms that include encryption and decryption both. The importance of cryptography is discussed. The problem statement here is, to form a cryptographic algorithm that uses randomization. Usage of high amount of randomization makes it tougher for one to ..."
Abstract
- Add to MetaCart
Cryptography is the study of cryptographic algorithms that include encryption and decryption both. The importance of cryptography is discussed. The problem statement here is, to form a cryptographic algorithm that uses randomization. Usage of high amount of randomization makes it tougher for one
Comparative Study on Various Cryptographic Techniques
"... In today’s world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over our system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used ..."
Abstract
- Add to MetaCart
is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format called cipher text. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. The main objective
SECURITY BASED ON CRYPTOGRAPHIC TECHNIQUES FOR REMOTE CONTROL SYSTEMS
"... Abstract: Security based on cryptographic techniques is commonly used in many applications from many fields. Using security based on cryptographic techniques in remote control systems is certainly a subject of great interest. This paper will try to bring some points of view on the security objective ..."
Abstract
- Add to MetaCart
Abstract: Security based on cryptographic techniques is commonly used in many applications from many fields. Using security based on cryptographic techniques in remote control systems is certainly a subject of great interest. This paper will try to bring some points of view on the security
Cryptographic Techniques for Privacy-Preserving Data Mining
- SIGKDD Explorations
, 2002
"... Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything ..."
Abstract
-
Cited by 92 (0 self)
- Add to MetaCart
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. These results were shown using generic constructions that can be applied to any function that has an ecient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. We also show examples of secure computation of data mining algorithms that use these generic constructions.
Results 1 - 10
of
2,732