Mining learner-friendly security patterns from huge published histories of software applications for an intelligent tutoring system in secure coding

SM Imtiaz, KZ Sultana, AS Varde - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Security patterns are proven solutions to recurring problems in software development. The
growing importance of secure software development has introduced diverse research efforts …

On the Shannon perfect secrecy result

HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key
bits to the information bits. This fact has been studied for decades and known as" Shannon …

Achieving perfect secrecy with one bit keys

MK Kiskani, HR Sadjadpour - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Shannon perfect secrecy, also known as one-time pad, can only be achieved by using
exactly a different key bit for each information bit. This requirement makes the …

A new security scheme for cloud storage systems and its performance evaluation using avalanche effect

HR Sadjadpour, SM Ashok - 2021 55th Asilomar Conference on …, 2021 - ieeexplore.ieee.org
We introduce a new protocol that achieves Shannon perfect secrecy performance using
significantly lower key size than the original approach of one-time pad. We achieve this goal …

Secure and private information retrieval (SAPIR) in cloud storage systems

MK Kiskani, HR Sadjadpour - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
An information theoretic approach to security and privacy for cloud data storage systems is
introduced in this paper. The approach called Secure and Private Information Retrieval …

[PDF][PDF] Privy Cloud/Web Server TS

M Patel, R Patel - researchgate.net
A stolen tablet, a crushed hard drive, a broken telephone-these are the things that
modernized terrible dreams are made of. Luckily, while we may lose our equipment, and we …

Compact key encoding of data for public exposure such as cloud storage

HR Sadjadpour, MK Kiskani - US Patent 11,334,676, 2022 - Google Patents
Techniques for secure public exposure of digital data include extracting n chunks, each
containing Q bits, n= 2 (Q+ 1). A random mapping of each chunk to only one batch of M …

Privy Cloud/Web Server

M Patel, R Patel - Data Science and Intelligent Applications: Proceedings …, 2021 - Springer
A stolen tablet, a crushed hard drive, a broken telephone—these are the things that
modernized terrible dreams are made of. Luckily, while we may lose our equipment, and we …