Sciweavers

179 search results - page 24 / 36
» Symmetric-Key Homomorphic Encryption for Encrypted Data Proc...
Sort
View
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
14 years 15 days ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
ENTCS
2007
96views more  ENTCS 2007»
13 years 7 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
NDSS
2009
IEEE
14 years 2 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
ICMCS
2006
IEEE
110views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Video Scrambling Scheme Applicable to Local Region without Data Expansion
Recently, several scrambling techniques have been proposed for video digitally archived. These methods realize efficient processing by partial encryption on MPEG compressed data ...
Makoto Takayama, Kiyoshi Tanaka, Akio Yoneyama, Ya...