• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 58,038
Next 10 →

Analysis and Comparison of Cryptographic Techniques in E-voting and

by Yong-sork Her, Kenji Imamoto, Kouichi Sakurai , 2005
"... Abstract: Recently, many cryptographic techniques have been used for secure e-voting sys-tems and e-auction systems. In this paper, we compare the used cryptographic techniques of e-voting systems with those of e-auction systems. We analyze advantages and disadvantages of various cryptographic techn ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract: Recently, many cryptographic techniques have been used for secure e-voting sys-tems and e-auction systems. In this paper, we compare the used cryptographic techniques of e-voting systems with those of e-auction systems. We analyze advantages and disadvantages of various cryptographic

A Confidential Passive UHF Reader with Cryptographic Technique

by Wei He, Weihua Sun, Junling Ma, Shicheng Li
"... Abstract. In this paper, a passive UHF reader design with cryptographic technique SM2 is presented. By designing board compatibility of security module, RFID control module, RF module, communications interface, the passive UHF reader can both operate at common mode and security mode. This design con ..."
Abstract - Add to MetaCart
Abstract. In this paper, a passive UHF reader design with cryptographic technique SM2 is presented. By designing board compatibility of security module, RFID control module, RF module, communications interface, the passive UHF reader can both operate at common mode and security mode. This design

CRYPTOGRAPHIC TECHNIQUES- ESSENTIAL APPLICATIONS IN NETWORK ADMINISTRATION

by Sevinç Ozkara, Senior Scientist
"... Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, ..."
Abstract - Add to MetaCart
, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area

Advanced Cryptographic Techniques for Secured Cloud Computing

by Nilotpal Chakraborty, G K Patra
"... The past decade of computing has witnessed a number of new computational models and the most prominent among them is Cloud Computing. Cloud Computing is a paradigm shift that helps a user with internet based computing services that can be accessed from anywhere on any platform. But despite of its ad ..."
Abstract - Add to MetaCart
remains to be undercover. This paper discusses about the two most promising cryptographic techniques, that are, if implemented correctly can effectively mitigate the security threats and can help in an increased uses of cloud computing.

Implementation of Clipboard Security using Cryptographic Techniques

by Gaurav Pathak
"... In the present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between a ..."
Abstract - Add to MetaCart
. In our approach we prevent the clipboard data by encrypting the content at the time of copying & cutting and decrypting at the time of pasting, for this we use cryptographic techniques.

A calculus for cryptographic protocols: The spi calculus

by Martin Abadi, Andrew D. Gordon - Information and Computation , 1999
"... We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the ..."
Abstract - Cited by 919 (55 self) - Add to MetaCart
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols

Security and Composition of Multi-party Cryptographic Protocols

by Ran Canetti - JOURNAL OF CRYPTOLOGY , 1998
"... We present general definitions of security for multi-party cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation. The definiti ..."
Abstract - Cited by 465 (19 self) - Add to MetaCart
We present general definitions of security for multi-party cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation

A Visual Cryptographic Technique to Secure Image Shares

by Jagdeep Verma Dr. Vineeta Khemchandani
"... The Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by breaking it into shares. A distinctive property of VCS is that one can visually decode the secret image by superimposing shares without computation. The project presents an approach for embedding visual cryptogra ..."
Abstract - Add to MetaCart
cryptographically generated image shares in the host images to provide authentication for the VC shares and makes these secret shares invisible by embedding them into host images. The secret shares generated from VC encryption are watermarked into some host images using digital watermarking. Digital watermarking

Cyclic Cryptographic Technique Using Substitution and Genetic Function

by Ira Banerjee, Dipanjan Das
"... Abstract- The paper introduces a new algorithm for encryption and decryption. The process of substitution and genetic function is the core of the algorithm. With the use of the below mentioned method encryption or decryption of a message would be done in a new way. All are shown in Figure I ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract- The paper introduces a new algorithm for encryption and decryption. The process of substitution and genetic function is the core of the algorithm. With the use of the below mentioned method encryption or decryption of a message would be done in a new way. All are shown in Figure I

Safe enclosures: towards cryptographic techniques for server protection

by Sergiu Bursuc, Julian P. Murphy
"... Abstract. Cryptography is generally used to protect sensitive data from an untrusted server. In this paper, we investigate the converse question: can we use cryptography to protect a trusted server from untrusted data? As a first step in this direction, we propose the notion of safe enclosures. Intu ..."
Abstract - Add to MetaCart
. Intuitively, a safe enclosure is a cryptographic primitive that encapsulates data in a way that allows to perform some computation on it, while at the same time protecting the server from malicious data. Furthermore, a safe enclosure should come equipped with a dedicated protocol that implements the enclosing
Next 10 →
Results 11 - 20 of 58,038
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University