We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...