Academic literature on the topic 'Modified User Supplied Key based Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Modified User Supplied Key based Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Modified User Supplied Key based Encryption"

1

Surya, Pratap Singh* Upendra Nath Tripathi. "PRESERVING DATABASE CONFIDENTIALITY USING MODIFIED USER SUPPLIED KEY BASED ENCRYPTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 274–81. https://doi.org/10.5281/zenodo.192615.

Full text
Abstract:
The security issues in database are growing very fast as the attackers and hackers are trying everything to compromise the security of the database. The confidentiality of the database is one of the most important aspects that needed to be maintained. One of the most effective ways to maintain the database confidentiality is Encryption. One method to achieve the standard encryption is user supplied key based encryption because this encryption technique provides the cipher text whose length is different in comparison to plain text. But it have one major shortcoming one plain text character is c
APA, Harvard, Vancouver, ISO, and other styles
2

Rathod, Amit, and Kajal Patel. "Internal Re-keying Based Modified AES." Indian Journal Of Science And Technology 18, no. 1 (2025): 85–94. https://doi.org/10.17485/ijst/v18i1.2012.

Full text
Abstract:
Objectives: Masking and re-keying are two major countermeasures against the Power Side Channel Analysis attacks. Re-keying has either secret sharing overhead or needs to be used in synchronization. The Advanced Encryption System (AES) has been modified in the proposed scheme and uses re-keying without the need for secret random sharing or need for synchronized communication. The research proposed a modified AES scheme and validated its effectiveness with the AES. Methods: This study proposes modifying AES and then implementing it as software encryption using Python. As the AES has been modifie
APA, Harvard, Vancouver, ISO, and other styles
3

Amit, Rathod, and Patel Kajal. "Internal Re-keying Based Modified AES." Indian Journal of Science and Technology 18, no. 1 (2025): 85–94. https://doi.org/10.17485/IJST/v18i1.2012.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;Masking and re-keying are two major countermeasures against the Power Side Channel Analysis attacks. Re-keying has either secret sharing overhead or needs to be used in synchronization. The Advanced Encryption System (AES) has been modified in the proposed scheme and uses re-keying without the need for secret random sharing or need for synchronized communication. The research proposed a modified AES scheme and validated its effectiveness with the AES.&nbsp;<strong>Methods:</strong>&nbsp;This study proposes modifying AES and then implementing it as sof
APA, Harvard, Vancouver, ISO, and other styles
4

Surya, Pratap Singh* Manish Mishra Upendra Nath Tripathi. "PRESERVING DATABASE CONFIDENTIALITY USING USER KEY BASED ENCRYPTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 10 (2016): 33–41. https://doi.org/10.5281/zenodo.159209.

Full text
Abstract:
The security of database is very important as data is the most valuable asset in the modern environment. Various security methodologies are available to secure databases. Most of the available methodologies focus on access control of the database, but there may be situations when someone intentionally or accidentally break or bypass the access control mechanism of the database and hence the confidentially of the database could be compromised. Various methods are available to preserve the confidentially of the database in those situations. The best solution in this case is encryption. Various R
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Zhe, Fuqun Wang, Kefei Chen, and Fei Tang. "A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update." Security and Communication Networks 2020 (December 22, 2020): 1–11. http://dx.doi.org/10.1155/2020/8856592.

Full text
Abstract:
The revocable ciphertext-policy attribute-based encryption (R-CP-ABE) is an extension of ciphertext-policy attribute-based encryption (CP-ABE), which can realize user direct revocation and maintain a short revocation list. However, the revoked users can still decrypt the previously authorized encrypted data with their old key. The R-CP-ABE scheme should provide a mechanism to protect the encrypted data confidentiality by disqualifying the revoked users from accessing the previously encrypted data. Motivated by practical needs, we propose a new user R-CP-ABE scheme that simultaneously supports
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Lu. "A Method for Key Updating of IBE with Wildcards." Advanced Materials Research 765-767 (September 2013): 1003–6. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1003.

Full text
Abstract:
A variety of identity-based encryption mechanisms are gradually developed since BF-IBE was proposed in 2001. However, since a users public key is fully open and cannot be modified, the key update issue needs to be solved urgently. And at the same time, hierarchical IBE has been proposed to reduce the burden of a single PKG. The paper suggests wildcards and put forward WIBE, which can make one-time encryption for user groups of HIBE. Then WKU is put out based on WIBE, which is a key updating mechanism in the measure of years and manages the expiration date of users keys.
APA, Harvard, Vancouver, ISO, and other styles
7

Patel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.

Full text
Abstract:
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate and distribute the private key to each user to decrypt a message. The thought behind presenting the scheme was to improve and reduce the complexity of certificate and key management, but it also gives rise to key escrow problem, access to encrypted information to unauthorized users. The paper represents Improved Identity-Based Encryption Scheme (IIBE
APA, Harvard, Vancouver, ISO, and other styles
8

Adlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.

Full text
Abstract:
Abstract - Security is an action to prevent the occurrence of dangers, threats, and attacks, especially the security of cryptocurrency storage assets on the smartphone crypto mobile wallet application. Security is important to protect wallet data from asset theft attacks. The results of the observations made by many users store their wallet recovery words (mnemonic phrases) on cloud services such as Google Drive and One Drive, this is very vulnerable to data hacking if the account has been compromised then hackers take valuable data for their own benefit. Computer scientists created a cryptogr
APA, Harvard, Vancouver, ISO, and other styles
9

Aggarwal, Mayank, Anju Malik, and Mani Madhukar. "Effective Cryptographic Renewal Method with Rivest-Shamir-Adleman, Modified Artificial Bee Colony Optimization to Achieve Secure Cloud Storage and Computation in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2699–705. http://dx.doi.org/10.1166/jctn.2020.9108.

Full text
Abstract:
With the tremendous development of the online information, the term “Cloud Computing” offers multiple kinds of outsourcing and storage services to the user. Data security and privacy issues introduces multiple hurdles into it such as data leakage, calculating the key for data encryption, lack of proper security policies and renewal of application in cloud environment. One of the main issues is how to store encrypted data, decrypt it when required and renewal of application to face the security challenges. In this work we have proposed a secured and timestamp value based approach using RSA-MABC
APA, Harvard, Vancouver, ISO, and other styles
10

Priya Remamany, Krishna, K. Maheswari, C. Ramesh Babu Durai, et al. "A Localized Bloom Filter-Based CP-ABE in Smart Healthcare." Applied Sciences 12, no. 24 (2022): 12720. http://dx.doi.org/10.3390/app122412720.

Full text
Abstract:
Wearable technology-supported cloud-based smart health (s-health) has emerged as a promising answer to increase the efficiency and quality of healthcare as a result of rapid improvements in Internet of Things (IoT) technologies. However, the issues of data security and privacy preservation have not been fully resolved. In recent years, ciphertext policy attribute-based encryption (CP-ABE), which was developed as a versatile and potent cryptographic fundamental to accomplish one-to-many encryption with fine-grained access control, has been seen as a viable answer to the security issue in the cl
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!