نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2014
Ashwaq T. Hashim Loay E. George

Visual cryptography is a secure technique enable distributing sensitive visual data to participant through public communication channels. In visual cryptography a secret image is cryptographically encrypted into some shares (transparencies) such that the generated secure shares do not reveal any information without they are not combined in prescribed way. The main challenges facing secure image...

2005
Ravi Sandhu Latifur Khan Douglas Harris Bhavani Thuraisingham Leslie Harper

There is a critical need for organizations to share data within and across infospheres and form coalitions so that analysts could examine the data, mine the data, and make effective decisions. Each organization could share information within its infosphere. An infosphere may consist of the data, applications and services that are needed for its operation. Organizations may share data with one a...

Journal: :EURASIP Journal on Wireless Communications and Networking 2014

Journal: :CoRR 2015
V. P. Binu A. Sreekumar

Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the need for time consuming encryption decryption process and also the complexity involved in key management. The data must also be protected from untrusted cloud service providers. Secret sharing based solution provides secure information dispersal by making shares of the original data and distributes them amon...

Journal: :IACR Cryptology ePrint Archive 2005
Liangliang Xiao Mulan Liu Zhifang Zhang

With respect to a special class of access structures based on connectivity of graphs, we start from a linear secret sharing scheme and turn it into a secret sharing scheme with perfect security and exponentially small error probability by randomizing the reconstruction algorithm through random walks on graphs. It reduces the polynomial work space to logarithmic. Then we build the corresponding ...

2013
Parthajit Mohapatra Chandra R. Murthy

This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user’s data bits, time sharing, and transmission of random bits, depending on the rate...

2004
Ganesh Godavari Edward Chow

The objective of the proposal is to examine the existing security models for supporting information sharing among multiple agencies and suggest extension for addressing the new requirement. Procedures for enforcing and tracking secure information distribution will be investigated. Existing group key management will be enhanced to address the scaling and tracking issues. To validate the revised ...

1994
Evangelos Kranakis Danny Krizanc Paul Van Oorschot

This paper considers true broadcast systems for the secure communication of session keys. These are schemes that provide for parallel rather than serial construction of broadcast messages, while avoiding selective broadcasting. We improve upon a model implemented with Shamir's threshold scheme, and use information theoretic techniques to show that this enhancement is optimal. We then present a ...

Journal: :IACR Cryptology ePrint Archive 2011
Dan Bogdanov Riivo Talviste Jan Willemson

In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant’s privacy, we use secret sharing and secure multi-party computation (MPC) techniques. While MPC has been used to solve real-life problems beforehand, this is the first time where the actual MPC computation on real data was done over the i...

2006
Hiroshi Ishii Chee Onn Chow Masahiro Yamamoto Sakurako Horie Hiroaki Nishikawa

Recently, disasters are often striking the earth. In case of those emergency cases, information sharing infrastructure is highly required to be available with minimum security. This paper proposes a basic concept of responsive event-driven safe and secure information sharing platform to respond the above requirement. Our idea is twofold. One is the robust ad hoc network concept. When hosts and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید