نتایج جستجو برای: order preserving encryption
تعداد نتایج: 975584 فیلتر نتایج به سال:
We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto’07. Our work introduces: 1) A generic and efficient construction of deterministic length-preserving hybrid encryption, which is an improvement on the scheme sketched in the above paper; to our best knowledge, this is the first example of length-preserving hybr...
Data mining can be performed with four different directions Association, Clustering, Classification and the Bayesian formula. In the recent years, many privacy preserving techniques are developed. These techniques are used to provide the privacy to the data. Here privacy related various information is gathered with their brief introduction. Here mainly focus is on the classification decision tr...
Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard’s host. This paper describes an new scheme, the length-preserving “accelerated remotely keyed” (ARK) encryption scheme an...
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a valid creditcard number. The problem has been known for some time, but it has lacked a fully general and rigorous treatment. We provide one, starting off by formally defining FPE and security goals for it. We investigate...
Encrypting Personally Identifiable Information (PII) in large databases has historically been difficult, because encrypting information typically implies expanding data and changing its format. Previous attempts to encrypt PII data like credit card numbers and Social Security Numbers without changing their format have used questionable cryptographic constructions. We examine the security model ...
This paper proposes a nonparametric FPE-like procedure based on the smooth backfitting estimator when the additive structure is a priori known. This procedure can be expected to perform well because of its well-known finite sample performance of the smooth backfitting estimator. Consistency of our procedure is established under very general conditions, including heteroskedasticity.
The methods of defining and evaluating evolution of information in economic systems are often based on abstract measuretheoretic mean-preserving transformations (MPTs), also known as second-order stochastic dominance. This study first points out that such abstract MPTs have distributional equivalents and then shows that the distributional MPTs often provide analytical settings that are more acc...
The present study examined the hypothesis that Asian cultures’ dialectical way of thinking influences emotion reports. A dialectical way of thinking sees emotions of the opposite valence (e.g., happy, sad) as compatible with each other. In contrast, Western philosophy considers these emotions to be in conflict with each other. We examined correlations between frequency estimates of pleasant emo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید