Results 231 to 240 of about 29,404 (289)
Some of the next articles are maybe not open access.

Related searches:

Authenticating encrypted data

2011 National Conference on Communications (NCC), 2011
Traditionally message authentication codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper we propose to integrate the two in a framework where the parameterized hash value of an encrypted image is ...
Sachin Kashyap, Kannan Karthik
openaire   +1 more source

Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption

2004
Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of ...
Yi Mu   +3 more
openaire   +1 more source

Authenticated encryption in SSH

Proceedings of the 9th ACM conference on Computer and communications security - CCS '02, 2002
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen ...
Mihir Bellare   +2 more
openaire   +1 more source

Disk-enabled authenticated encryption

2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010
Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest.
Kevin Butler   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy