نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

2013
Xiaoqiang Guo Shuai Zhang Ying Li

With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introdu...

Journal: :CoRR 2010
Krishnan Kumar J. Nafeesa Begum V. Sumathy

Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of users. However, current peer-to-peer information sharing systems work mostly on wired networks. With the growing number of communication-equipped mobile devices that can self-organize into infrastructu...

Journal: :International Journal of Advanced Computer Science and Applications 2021

2003
Gregory B. Newby Kevin Gamiel

This work describes the emerging standard for information retrieval on computational grids, GridIR. GridIR is based on the work of the Global Grid Forum and offers a security model for end-to-end data channel encryption, system authentication, and logging. GridIR implements a multi-tiered security model at the collection, query and datum level. Unlike monolithic search engines and customized sm...

2005
Shuang Sun Peng Liu Guruprasad Airy Shizhuo Zhu John Yen

Information assurance and information sharing are two contradictory yet important tasks in a distributed and information rich environment. Many reports regarding intelligence failures on preventing the Sep 11’s tragic events challenge the current information technologies that are often segregated for easiness of information assurance and demand systems that better support information sharing re...

Journal: :CoRR 2010
Md. Headayetullah G. K. Pradhan

Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed o...

Journal: :IEICE Transactions 2008
Kunihiko Harada Hirosuke Yamamoto

In a network with capacity h for multicast, information Xh = (X1, X2, · · · , Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information S r = (S 1, S 2, · · · , S r) can be transmitted securely against wiretappers by k-secure network coding for k ≤ h−r. In this case, no information of the secret leaks out even if an adversary...

2013
Eleftheria Makri Maarten H. Everts Sebastiaan de Hoogh Andreas Peter Harm op den Akker Pieter H. Hartel Willem Jonker

We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party Computation from Shamir’s Secret Sharing. Basically, our se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید