2014 17th International Conference on Network-Based Information Systems 2014
DOI: 10.1109/nbis.2014.22
|View full text |Cite
|
Sign up to set email alerts
|

A Group File Encryption Method using Dynamic System Environment Key

Abstract: File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method using Dynamic System Environment Key (GEMS for short), which provides users with autocrypt, authentication, autho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
0
0
Order By: Relevance
“…The idea of environmental matching keys is first introduced in [8]. A personal device's parameters, which can be IMEI code, CPU ID, Mac address of NIC, etc., are used to create an unique environmental matching key, which is then utilized to generate a public matching key.…”
Section: Environmental/public Matching Key Generationmentioning
confidence: 99%
“…The idea of environmental matching keys is first introduced in [8]. A personal device's parameters, which can be IMEI code, CPU ID, Mac address of NIC, etc., are used to create an unique environmental matching key, which is then utilized to generate a public matching key.…”
Section: Environmental/public Matching Key Generationmentioning
confidence: 99%