Results 201 to 210 of about 6,985 (236)

Participant Evaluation of Blockchain-Enhanced Women's Health Research Apps: Mixed Methods Experimental Study.

open access: yesJMIR Mhealth Uhealth
Ng MY   +9 more
europepmc   +1 more source

Randomized Convergent Encryption in the Standard Model via UCEs

open access: closed2015 International Conference on Computer Science and Applications (CSA), 2015
In this paper, we instantiate random oracle (RO) H in the Randomized Convergent Encryption proposed by Bellare et al. (Eurocrypt 2013) via a universal computation alextractor (UCE). We prove that if H is UCE secure for statistically unpredictable source, then there constructed RCE[H] is PRV$-CDA (Strong Privacy-Chosen Distribution Attacks) secure in ...
Huige Wang   +3 more
exaly   +3 more sources

Holographic encryption system in the Fresnel domain with convergent random illumination

open access: closedOptical Engineering, 2010
A secure holographic system is proposed, based on the principle of two-wave encryption in the Fresnel domain under convergent random illumination. The convergent random wavefront, instead of the commonly used plane wavefront, improves the security of a holographic encryption system, providing better protection from unauthorized users.
Joby Joseph, Kehar Singh
exaly   +3 more sources

Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud

open access: closed2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), 2020
Conventional encryption schemes are being used over the years for securing outsourced data to cloud. However, this impedes deduplication- the ability to identify and remove duplicate data from storage server. The idea of Convergent Encryption was introduced to overcome this problem which ensures that identical plaintext files will always produce ...
Dakshnamoorthy Manivannan
exaly   +3 more sources

Convergent encryption enabled secure data deduplication algorithm for cloud environment

open access: closedConcurrency Computation Practice and Experience
SummaryThe exponential growth of data poses a critical challenge for cloud storage systems. Redundant data consumes valuable storage space and increases infrastructure costs. Data deduplication, a technique for eliminating duplicate data copies, offers a promising solution.
Shahnawaz Ahmad
exaly   +3 more sources

DICE: A dual integrity convergent encryption protocol for client side secure data deduplication

open access: closed2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2017
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth.
Dr. Priyanka Singh, Pradeep K Atrey
exaly   +4 more sources

Home - About - Disclaimer - Privacy