2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2014
DOI: 10.1109/imis.2014.31
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Techniques in Advanced Information Management

Abstract: The paper presents new solutions in the area of application cryptographic protocols for strategic or personal information protection and management. Computer techniques for classified information protection and distribution will be described in the context of application for security purposes personal or biometric information. Such techniques may also support the management processes of confidential data, and distribution of parts of shared information in large management structures. Development of presented a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Cryptography and information security theory are two traditional privacy-preserving approaches 5 . Multi-party computation 6 is an important technology of cryptography that solves the problem of two or more users in a mutually distrustful multi-user network.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography and information security theory are two traditional privacy-preserving approaches 5 . Multi-party computation 6 is an important technology of cryptography that solves the problem of two or more users in a mutually distrustful multi-user network.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography and information security theory are two traditional privacy-preserving approaches. 5,6 Homomorphic encryption is an important technology of cryptography. 7,8 The work 9 proposed a fully homomorphic encryption scheme with encryption depth optimization, which can simplify the re-encryption process and improve the efficiency of the fully homomorphic encryption scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Splitting and sharing algorithms usually divide secure data, data sets or strategic information, into n different parts or shares. The secret splitting procedures were discuses in publication [6] [7][8] [15] [16]. Secret sharing protocols were described in publication [9], [11] [14][18] [19].…”
Section: Introductionmentioning
confidence: 99%
“…The sharing protocols were dedicated to many kind of digital information [3][5] [14][15] [16]. For example: to sharing of secret data [9][13] [17], to manage information in business protocols or management processes [7][8] [10], to distribute strategic information [11], and also for homeland security purposes [6].…”
Section: Introductionmentioning
confidence: 99%