Results 231 to 240 of about 29,312 (265)
Some of the next articles are maybe not open access.

Related searches:

Authenticating encrypted data

2011 National Conference on Communications (NCC), 2011
Traditionally message authentication codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper we propose to integrate the two in a framework where the parameterized hash value of an encrypted image is ...
Sachin Kashyap, Kannan Karthik
openaire   +1 more source

Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption

2004
Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of ...
Yi Mu   +3 more
openaire   +1 more source

Authenticated encryption in SSH

Proceedings of the 9th ACM conference on Computer and communications security - CCS '02, 2002
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen ...
Mihir Bellare   +2 more
openaire   +1 more source

Disk-enabled authenticated encryption

2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010
Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest.
Kevin Butler   +2 more
openaire   +1 more source

Convertible authenticated encryption scheme

Journal of Systems and Software, 2002
The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose.
Tzong-Sun Wu, Chien-Lung Hsu
openaire   +1 more source

Authenticated Broadcast Encryption Scheme

21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
With the advancement of wireless networks and mobile access devices such as cell phones and PDAs, multimedia services could be offered through wireless broadcast networks to these mobile devices. Therefore, there is a need to securely deliver multimedia content/data to many users over an insecure channel.
Chik How Tan   +2 more
openaire   +1 more source

Ring authenticated encryption : a new type of authenticated encryption

2004
By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification ...
Lv, Jiqiang   +3 more
openaire   +1 more source

Authentication protocols using encryption techniques

2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016
Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is.
Venkata SreeKrishna Koganti   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy