The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new method of proxy re-encryption using rectangular integer matrices as the private keys is described. The technique uses modular arithmetic to limit the size of the elements of the key matrices and also to provide resistance to cryptanalysis attack.
Data of similar nature are disseminated across organizations and needs to be analyzed to discover patterns and obtain relevant conclusions. While mining distributed data, disclosure of the sensitive information is a limitation that needs to be handled. This paper focuses on the construction of one such privacy preserving clustering approach that clusters, scattered data using the k-means strategy...
Electronic transaction signing is an important process as the volume and value of electronic transactions is increasing. There is a need for a secure yet convenient process to authorize the electronic transaction. On the other hand, current solutions often have complex deployment requirements, inclusive of a predefined communication channel to be established between the signer client and the signature...
Authentication is significant not only to data transmission operations but also network organizational functions in wireless sensor networks. Recently data authentication has been the focus of the research community in wireless sensor networks. Wireless sensor network (WSN) nodes are inherently resource constrained: they have restricted communication bandwidth, storage capacity, and processing speed...
This Paper proposes a Novel frame work for reversible data hiding scheme over an encrypted cover medium. Reversible data hiding techniques are gaining huge importance in recent years due to its excellent feature of enabling zero distortion reconstruction of both cover medium information as well as secret data information, while protecting the confidentiality of the payload image information. We propose...
Cloud computing is a trending paradigm that combines several computing concepts and technologies of the Internet to create a platform for more agile, cost effective and reliable model for the public users, business applications and IT infrastructure. There are various requirements that need to be addressed by Cloud Service Provider (CSP) for enabling the cloud services to the users such as security,...
QR codes, intended for maximum accessibility are widely in use these days and can be scanned readily by mobile phones. Their ease of accessibility makes them vulnerable to attacks and tampering. Certain scenarios require a QR code to be accessed by a group of users only. This is done by making the QR code cryptographically secure with the help of a password (key) for encryption and decryption. Symmetric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.