نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

1995
Rosario Gennaro Silvio Micali

We present a stronger notion of veri able secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veri able secret sharing is used as a tool within larger protocols, rather than being a goal in itself.

Journal: :IACR Cryptology ePrint Archive 2009
Arpita Patra Ashish Choudhary C. Pandu Rangan

Secure multiparty computation (MPC) allows a set of n parties to securely compute an agreed function, even if up to t parties are under the control of an adversary. In this paper, we propose a new Asynchronous secure multiparty computation (AMPC) protocol that provides information theoretic security with n = 4t+ 1, where t out of n parties can be under the influence of a Byzantine (active) adve...

Journal: :J. Internet Serv. Inf. Secur. 2012
Marek R. Ogiela Lidia Ogiela Urszula Ogiela

In this paper will be proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren’t any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not ...

2005
Hiroshi Ishii Yoshitsugu Kondo Hiroaki Nishikawa

This paper proposes a basic concept of person-oriented ubiquitous and secure information sharing environment. In the ubiquitous network environment, people, within a predefined restriction, can access and use information, network and computing resources wherever and whenever they are. Here, the owner of the resource and/or information is not necessarily same as the user. At the same time, the u...

Journal: :پژوهشنامه پردازش و مدیریت اطلاعات 0
سلمان نظری salman nazari

as one of the most important components of a nations basic facilities, the networking of the library plays a vital role in terms of promoting the sharing of access to information. although the traditional methods of literature indexing and accessing will continue to exist and develop, library networking will become the new model and the direction for the development of the library. through the ...

2007
C. L. Connors M. A. Malloy E. V. Masek

This paper discusses issues relevant to accomplishing secure data sharing among federated national entities. This is an important, timely problem particularly in the defense sector since multi-national operations have become the norm. Similarly, the commercial marketplace today is a global one, requiring the exchange of information in support of transactions on an international scale. Tradition...

Journal: :CoRR 2011
Md. Headayetullah G. K. Pradhan Sanjay Biswas B. Puthal

This paper mainly depicts the conceptual overview of vertical integration, semantic interoperability architecture such as Educational Sector Architectural Framework (ESAF) for New Zealand government and different interoperability framework solution for digital government. In this paper, we try to develop a secure information sharing approach for digital government to improve home land security....

Journal: :Australian Computer Journal 1999
Keith M. Martin Josef Pieprzyk Reihaneh Safavi-Naini Huaxiong Wang

The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there are no secure channels. First we motivate the problem and discuss methods of threshold change when the dealer is still active and can use broadcasting to implement This work was supported by the European Commission unde...

Journal: :Quantum Information Processing 2014

2008
Nabil R. Adam Vijayalakshmi Atluri Soon Ae Chun John Ellenberger Basit Shafiq Jaideep Vaidya Hui Xiong

Effective incident management and response requires timely and coordinated decision making. 9/11, Katrina and other emergent events demonstrate the need for effective information sharing and decision support at the operational as well as at the strategic levels. There has been significant work on emergency response at the first-responder level. This paper addresses the challenge of integrating,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید