Secure Personal Content Networking Over Untrusted Devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Personal Content Networking Over Untrusted Devices

Securely sharing and managing personal content is a challenging task in multidevice environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) becausewe aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file o...

متن کامل

Secure Data Replication over Untrusted Hosts

Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more frequent that data content is placed on hosts that are not directly controlled by the content owner, and because of this, security mechanisms to protect data integrity are necessary. In this paper we present a system archi...

متن کامل

Secure Image Retrieval over Untrusted Cloud Servers

140 Abstract-Security issue represents the main barrier facing the wide adoption of cloud computing. Encryption is the best method to mitigate users' concerns. However, this method makes searching the encrypted data a challenging task. Accordingly, several approaches have been proposed to enable searching the encrypted, remotely stored data without decryption. Till now, almost all these approac...

متن کامل

Leveraging personal devices for stronger password authentication from untrusted computers

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continuesto be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer(typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related tokeyboard and screen size. However most such transact...

متن کامل

Secure Personal Information Management for Mobile Devices

More than six decades after Vannevar Bush put forward Memex [3], his vision of a personal information management (PIM) framework, most computer users are still constrained by a rigid hierarchical file organization, where the semantic relationships among data are not emphasized. The semantic desktop leverages the potential of the semantic web to address the challenges of complex PI spaces, which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2014

ISSN: 0929-6212,1572-834X

DOI: 10.1007/s11277-014-2093-4