Results 281 to 290 of about 48,518 (327)
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Deniable Searchable Symmetric Encryption
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fangguo Zhang, Chun-I Fan
exaly +3 more sources
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security, 2012Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara +2 more
openaire +2 more sources
Randomized symmetric block encryption
Proceedings of the First International Conference on Security of Internet of Things, 2012Most of the trivial symmetric block encryption algorithms give the same cipher text for a given set of plain text and key. This property can be used for performing linear and differential cryptanalysis. Using the concept of random data generation we designed a new scheme to give different cipher texts for a given set of plain text and key (when ...
B. Dinesh Reddy +2 more
openaire +1 more source
Searchable Symmetric Encryption
ACM Computing Surveys, 2017Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Geong Sen Poh +4 more
openaire +2 more sources
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire +2 more sources
Universally Composable Symmetric Encryption
2009 22nd IEEE Computer Security Foundations Symposium, 2009For most basic cryptographic tasks, such as public-key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations.
Ralf Küsters, Max Tuengerthal
openaire +2 more sources
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs, 2009Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire +1 more source
Amortized Threshold Symmetric-key Encryption
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021Threshold cryptography enables cryptographic operations while keeping the secret keys distributed at all times. Agrawal et al. (CCS'18) propose a framework for Distributed Symmetric-key Encryption (DiSE). They introduce a new notion of Threshold Symmetric-key Encryption (TSE), in that encryption and decryption are performed by interacting with a ...
Mihai Christodorescu +3 more
openaire +2 more sources
2012
Abstract This chapter concerns symmetric encryption and introduces core concepts and algorithms. It explains the difference between stream and block ciphers and demonstrates how their different properties result in different uses. Two important block ciphers are considered in some detail.
openaire +1 more source
Abstract This chapter concerns symmetric encryption and introduces core concepts and algorithms. It explains the difference between stream and block ciphers and demonstrates how their different properties result in different uses. Two important block ciphers are considered in some detail.
openaire +1 more source

