Cryptography: Salvaging Exploitations against Data Integrity

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kleptography: Using Cryptography Against Cryptography

The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats...

متن کامل

Cryptography Against Continual Memory Leakage

Recall from last lecture that we have several ways to model leakage. One model is “only computation leaks” by Micali and Reyzin [11], which assumes a form of secure memory that does not leak as long as no computation is done on the data. Another one is “memory leakage” by Akavia, Goldwasser, and Vaikuntanathan [1], which assumes that everything can leak information. From an orthogonal dimension...

متن کامل

Salvaging Information Engineering Techniques in the Data Warehouse Environment

The art of Information Engineering (IE) continuously evolves and, by today's standards, is considered an integral function in most any organization. Strategic planning teams weave methodologies, which are integrated to process information, the goal being to sort, store, and retrieve useful data. The following article will describe three techniques that can utilize existing information engineeri...

متن کامل

A Trend Analysis of Exploitations

We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumula...

متن کامل

Cryptography in Data Compression

This paper describes cryptographic methods for concealing information during data compression processes. These include novel approaches of adding pseudo random shuffles into the processes of dictionary coding (Lampel-Ziv compression), arithmetic coding, and Huffman coding. An immediate application of using these methods to provide multimedia security is proposed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Networks and Communications

سال: 2013

ISSN: 2326-893X

DOI: 10.11648/j.ajnc.20130202.14