Storing shared data on the cloud via security-mediator

B Wang, SSM Chow, M Li, H Li - 2013 IEEE 33rd International …, 2013 - ieeexplore.ieee.org
Nowadays, many organizations outsource data storage to the cloud such that a member
(owner) of an organization can easily share data with other members (users). Due to the …

A comprehensive comparison of multiparty secure additions with differential privacy

S Goryczka, L Xiong - IEEE transactions on dependable and …, 2015 - ieeexplore.ieee.org
This paper considers the problem of secure data aggregation (mainly summation) in a
distributed setting, while ensuring differential privacy of the result. We study secure …

Identity-based online/offline key encapsulation and encryption

SSM Chow, JK Liu, J Zhou - Proceedings of the 6th ACM symposium on …, 2011 - dl.acm.org
An identity-based online/offline encryption (IBOOE) scheme splits the encryption process
into two phases. The first phase performs most of the heavy computations, such as modular …

Server-aided signatures verification secure against collusion attack

SSM Chow, MH Au, W Susilo - Proceedings of the 6th ACM Symposium …, 2011 - dl.acm.org
Wireless handheld devices which support e-mail and web browsing are increasingly
popular. The authenticity of the information received is important, especially for business …

Sms security for smartphone

AM Sagheer, AA Abdulhameed… - … on Developments in …, 2013 - ieeexplore.ieee.org
The most popular and easiest communication technology in mobile phone devices is Short
Message Service (SMS). This service is designed to transfer unsecured information. Some …

Enhancing security in cryptographic algorithm based on LECCRS

K Mani, A Devi - Electronic Government, an International …, 2017 - inderscienceonline.com
The efficiency of any cryptographic algorithms depends on both security and operational
speed. When a message is encrypted using any cryptosystems it produces only one level of …

[PDF][PDF] A survey of compression and encryption techniques for SMS

M Patil, V Sahu - International Journal of Advancements in Research & …, 2013 - Citeseer
This Mobile communication is one of the fastest means of communication between one
senders to other. Although the data send through the mobiles via SMS is easy and fast but it …

[PDF][PDF] A Survey on Various Encoding, Encryption and compression Techniques

A Devi, K Mani - International Journal of Advanced Research in …, 2018 - academia.edu
This paper reports about the survey of various techniques available in an encryption and
also in compression technique. It is mainly analyzing the existing encoding and compressed …

Secure and Privacy-Preserving Distributed Data Release

SA Goryczka - 2014 - search.proquest.com
The rapidly increasing prevalence of distributed data-driven applications highlights security
and privacy issues in storing and processing sensitive data. Although manipulating raw data …