نتایج جستجو برای: order preserving encryption

تعداد نتایج: 975584  

Journal: :I. J. Network Security 2009
Yang Cui Kirill Morozov Kazukuni Kobara Hideki Imai

We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto’07. Our work introduces: 1) A generic and efficient construction of deterministic length-preserving hybrid encryption, which is an improvement on the scheme sketched in the above paper; to our best knowledge, this is the first example of length-preserving hybr...

2015
Hemant Vasava

Data mining can be performed with four different directions Association, Clustering, Classification and the Bayesian formula. In the recent years, many privacy preserving techniques are developed. These techniques are used to provide the privacy to the data. Here privacy related various information is gathered with their brief introduction. Here mainly focus is on the classification decision tr...

1999
Stefan Lucks

Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard’s host. This paper describes an new scheme, the length-preserving “accelerated remotely keyed” (ARK) encryption scheme an...

2009
Mihir Bellare Thomas Ristenpart Phillip Rogaway Till Stegers

Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a valid creditcard number. The problem has been known for some time, but it has lacked a fully general and rigorous treatment. We provide one, starting off by formally defining FPE and security goals for it. We investigate...

2008
Terence Spies

Encrypting Personally Identifiable Information (PII) in large databases has historically been difficult, because encrypting information typically implies expanding data and changing its format. Previous attempts to encrypt PII data like credit card numbers and Social Security Numbers without changing their format have used questionable cryptographic constructions. We examine the security model ...

2011
Zheng-Feng Guo Ling Yan Cao Ying He

This paper proposes a nonparametric FPE-like procedure based on the smooth backfitting estimator when the additive structure is a priori known. This procedure can be expected to perform well because of its well-known finite sample performance of the smooth backfitting estimator. Consistency of our procedure is established under very general conditions, including heteroskedasticity.

Journal: :Appl. Math. Lett. 2006
Hamid Beladi Lynda de la Vina Fathali Firoozi

The methods of defining and evaluating evolution of information in economic systems are often based on abstract measuretheoretic mean-preserving transformations (MPTs), also known as second-order stochastic dominance. This study first points out that such abstract MPTs have distributional equivalents and then shows that the distributional MPTs often provide analytical settings that are more acc...

2002
Ulrich Schimmack Shigehiro Oishi Ed Diener

The present study examined the hypothesis that Asian cultures’ dialectical way of thinking influences emotion reports. A dialectical way of thinking sees emotions of the opposite valence (e.g., happy, sad) as compatible with each other. In contrast, Western philosophy considers these emotions to be in conflict with each other. We examined correlations between frequency estimates of pleasant emo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید