Results 1 - 10
of
1,740
Cryptographic Protection of Databases and Software
- In Distributed Computing and Cryptography
, 1991
"... We describe experimental work on cryptographic protection of databases and software. The database in our experiment is a natural language dictionary of over 4000 Spanish verbs. Our tentative conclusion is that the overhead cost of computing with encrypted data is fairly small. 1 Introduction It is ..."
Abstract
-
Cited by 19 (2 self)
- Add to MetaCart
We describe experimental work on cryptographic protection of databases and software. The database in our experiment is a natural language dictionary of over 4000 Spanish verbs. Our tentative conclusion is that the overhead cost of computing with encrypted data is fairly small. 1 Introduction
Cryptographically Protected Objects
- In RenPar'9
, 1997
"... this paper we will present a new approach that guarantees the integrity of the execution environment to the provider of the mobile objects and protects the code and data of the objects against tampering, manipulation, and disclosure, both in transit and during execution. A rather similar approach fo ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
this paper we will present a new approach that guarantees the integrity of the execution environment to the provider of the mobile objects and protects the code and data of the objects against tampering, manipulation, and disclosure, both in transit and during execution. A rather similar approach
Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications
"... Abstract: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The crucial role of sufficient information content of biometric templates will be presented. It will be shown how to ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The crucial role of sufficient information content of biometric templates will be presented. It will be shown how
Cryptographically Protected Prefixes for Location Privacy in IPv6
"... Abstract. There is a growing concern with preventing unauthorized agents from discovering the geographical location of Internet users, a kind of security called location privacy. Typical deployments of IPv6 make it possible to deduce the approximate geographical location of a device from its IPv6 ad ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
address. We present a scheme called Cryptographically Protected Prefixes (CPP) 1, to address this problem at the level of IPv6 addressing and forwarding. CPP randomizes the address space of a defined topological region (privacy domain), thereby making it infeasible to infer location information from an IP
Low-Latency Cryptographic Protection for SCADA Communications
- In: Proc. 2nd Int. Conf. on Applied Cryptography and Network Security, ACNS 2004
, 2004
"... Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding
Issues with Existing Cryptographic Protection Methods for Routing Protocols
, 2010
"... Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this doc ..."
Abstract
-
Cited by 16 (2 self)
- Add to MetaCart
Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described
Cryptographic Protection of Connection Integrity with Interruption Detection in TINA
- in TINA., IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems
, 1997
"... The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise. We discuss threats that are caused by the ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
by the interruption of service control connections. A method to detect interruptions is presented and the handling of interruptions is described. The detection method is based on a cryptographic protocol using sequence numbers and probe messages. TINA and its security approaches are introduced. The threats
Modeling Security Threats to Cryptographically Protected Data
, 2009
"... In this paper, we introduce a mathematical model of threats for analyzing the security of cryptographic systems based on risk management principles. We also provide economic indicators as a basis to build a rationale for investments to cryptographic systems. Some points of designing software tools t ..."
Abstract
- Add to MetaCart
In this paper, we introduce a mathematical model of threats for analyzing the security of cryptographic systems based on risk management principles. We also provide economic indicators as a basis to build a rationale for investments to cryptographic systems. Some points of designing software tools
Issues with Existing Cryptographic Protection Methods for Routing Protocols
, 2010
"... Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this doc ..."
Abstract
- Add to MetaCart
Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described
Results 1 - 10
of
1,740