• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,740
Next 10 →

Cryptographic Protection of Databases and Software

by Joan Feigenbaum, Mark Y. Liberman, Rebecca N. Wright - In Distributed Computing and Cryptography , 1991
"... We describe experimental work on cryptographic protection of databases and software. The database in our experiment is a natural language dictionary of over 4000 Spanish verbs. Our tentative conclusion is that the overhead cost of computing with encrypted data is fairly small. 1 Introduction It is ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
We describe experimental work on cryptographic protection of databases and software. The database in our experiment is a natural language dictionary of over 4000 Spanish verbs. Our tentative conclusion is that the overhead cost of computing with encrypted data is fairly small. 1 Introduction

Cryptographically Protected Objects

by Uwe G. Wilhelm - In RenPar'9 , 1997
"... this paper we will present a new approach that guarantees the integrity of the execution environment to the provider of the mobile objects and protects the code and data of the objects against tampering, manipulation, and disclosure, both in transit and during execution. A rather similar approach fo ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
this paper we will present a new approach that guarantees the integrity of the execution environment to the provider of the mobile objects and protects the code and data of the objects against tampering, manipulation, and disclosure, both in transit and during execution. A rather similar approach

Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications

by U. Korte, R. Plaga, Godesberger Allee
"... Abstract: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The crucial role of sufficient information content of biometric templates will be presented. It will be shown how to ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The crucial role of sufficient information content of biometric templates will be presented. It will be shown how

Cryptographically Protected Prefixes for Location Privacy in IPv6

by Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
"... Abstract. There is a growing concern with preventing unauthorized agents from discovering the geographical location of Internet users, a kind of security called location privacy. Typical deployments of IPv6 make it possible to deduce the approximate geographical location of a device from its IPv6 ad ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
address. We present a scheme called Cryptographically Protected Prefixes (CPP) 1, to address this problem at the level of IPv6 addressing and forwarding. CPP randomizes the address space of a defined topological region (privacy domain), thereby making it infeasible to infer location information from an IP

Low-Latency Cryptographic Protection for SCADA Communications

by Andrew K. Wright, John A. Kinast, Joe Mccarty - In: Proc. 2nd Int. Conf. on Applied Cryptography and Network Security, ACNS 2004 , 2004
"... Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding

Issues with Existing Cryptographic Protection Methods for Routing Protocols

by V. Manral, M. Bhatia, J. Jaeggli, Nokia Inc, R. White , 2010
"... Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this doc ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described

Cryptographic Protection of Connection Integrity with Interruption Detection in TINA

by S. Staamann, U. Wilhelm - in TINA., IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems , 1997
"... The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise. We discuss threats that are caused by the ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
by the interruption of service control connections. A method to detect interruptions is presented and the handling of interruptions is described. The detection method is based on a cryptographic protocol using sequence numbers and probe messages. TINA and its security approaches are introduced. The threats

Modeling Security Threats to Cryptographically Protected Data

by Alexandra A. Savelieva , 2009
"... In this paper, we introduce a mathematical model of threats for analyzing the security of cryptographic systems based on risk management principles. We also provide economic indicators as a basis to build a rationale for investments to cryptographic systems. Some points of designing software tools t ..."
Abstract - Add to MetaCart
In this paper, we introduce a mathematical model of threats for analyzing the security of cryptographic systems based on risk management principles. We also provide economic indicators as a basis to build a rationale for investments to cryptographic systems. Some points of designing software tools

Issues with Existing Cryptographic Protection Methods for Routing Protocols

by J. Jaeggli, Nokia Inc, R. White, Cisco Systems , 2010
"... Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this doc ..."
Abstract - Add to MetaCart
Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described

Cryptographic Protection of Health Information: Cost And Benefit

by Joachim Biskup, Gerrit Bleumer , 1996
"... ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 1,740
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University