نتایج جستجو برای: secure information sharing
تعداد نتایج: 1254543 فیلتر نتایج به سال:
We present a stronger notion of veri able secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veri able secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
Secure multiparty computation (MPC) allows a set of n parties to securely compute an agreed function, even if up to t parties are under the control of an adversary. In this paper, we propose a new Asynchronous secure multiparty computation (AMPC) protocol that provides information theoretic security with n = 4t+ 1, where t out of n parties can be under the influence of a Byzantine (active) adve...
In this paper will be proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren’t any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not ...
This paper proposes a basic concept of person-oriented ubiquitous and secure information sharing environment. In the ubiquitous network environment, people, within a predefined restriction, can access and use information, network and computing resources wherever and whenever they are. Here, the owner of the resource and/or information is not necessarily same as the user. At the same time, the u...
as one of the most important components of a nations basic facilities, the networking of the library plays a vital role in terms of promoting the sharing of access to information. although the traditional methods of literature indexing and accessing will continue to exist and develop, library networking will become the new model and the direction for the development of the library. through the ...
This paper discusses issues relevant to accomplishing secure data sharing among federated national entities. This is an important, timely problem particularly in the defense sector since multi-national operations have become the norm. Similarly, the commercial marketplace today is a global one, requiring the exchange of information in support of transactions on an international scale. Tradition...
This paper mainly depicts the conceptual overview of vertical integration, semantic interoperability architecture such as Educational Sector Architectural Framework (ESAF) for New Zealand government and different interoperability framework solution for digital government. In this paper, we try to develop a secure information sharing approach for digital government to improve home land security....
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there are no secure channels. First we motivate the problem and discuss methods of threshold change when the dealer is still active and can use broadcasting to implement This work was supported by the European Commission unde...
Effective incident management and response requires timely and coordinated decision making. 9/11, Katrina and other emergent events demonstrate the need for effective information sharing and decision support at the operational as well as at the strategic levels. There has been significant work on emergency response at the first-responder level. This paper addresses the challenge of integrating,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید