Results 11 to 20 of about 6,891 (225)

Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]

open access: yes, 2015
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi   +3 more
core   +1 more source

Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications [PDF]

open access: yesJournal of Electrical Engineering, 2013
The trend toward converged networks where voice,IP,video and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits.But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of ...
Alaa E Din Riad   +3 more
openaire   +1 more source

Compiling and securing cryptographic protocols [PDF]

open access: yes, 2009
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role.
Abadi   +12 more
core   +7 more sources

Basic concepts in quantum computation [PDF]

open access: yes, 2000
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity ...
A. Barenco   +40 more
core   +4 more sources

Effective Privacy Amplification for Secure Classical Communications [PDF]

open access: yes, 2011
We study the practical effectiveness of privacy amplification for classical key-distribution schemes. We find that in contrast to quantum key distribution schemes, the high fidelity of the raw key generated in classical systems allow the users to always ...
Horvath, Tamas   +2 more
core   +3 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage

open access: yesJournal of Physics: Conference Series, 2018
Data deduplication is broadlyfor maintaining asole copy of user's data in cloud storage servers. Data Deduplication is a process of verify that whether the data are already stored in the cloud storage or not and maintain a single copy of data in the cloud.
G. Uma, L. Jayasimman
openaire   +1 more source

Relating two standard notions of secrecy [PDF]

open access: yes, 2006
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet   +11 more
core   +12 more sources

Molecular access to multi-dimensionally encoded information [PDF]

open access: yes, 2019
Polymer scientist have only recently realized that information storage on the molecular level is not only restricted to DNA-based systems. Similar encoding and decoding of data have been demonstrated on synthetic polymers that could overcome some of the ...
Aksakal, Resat   +2 more
core   +1 more source

Computing knowledge in security protocols under convergent equational theories [PDF]

open access: yes, 2012
International audienceThe analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modeled by a term algebra equipped
Ciobaca, Stefan   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy