Proceedings of the 6th International Workshop on Security Measurements and Metrics 2010
DOI: 10.1145/1853919.1853931
|View full text |Cite
|
Sign up to set email alerts
|

Security implications of selective encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In addition, main works on selective encryption focused on performance issues and not on security issues. That is why, Lundin and Lindskog have evaluated the security impact of the selective encryption by using the entropy and guesswork [11]. In this work, we combine between opposite QoS and security parameters with energy consumption consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, main works on selective encryption focused on performance issues and not on security issues. That is why, Lundin and Lindskog have evaluated the security impact of the selective encryption by using the entropy and guesswork [11]. In this work, we combine between opposite QoS and security parameters with energy consumption consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In [5] it was shown for first-order languages that the entropy is given by the expression H(X 0 ) n−1 i=0 b i . However, since |I| = n−1 i=0 b i , the expressions are equal.…”
Section: Zero-and First-order Languagesmentioning
confidence: 99%
“…Thus, when deriving an expression for H I 2 , the symbol preceding a run of ones must be taken into consideration. In [5], two cases were shown to affect the expression of H I 2 . The first case deals with a run of ones starting at the beginning of the bit vector, i ∈ I 1 = [0, β 1 ), and the second case deals with runs of ones not starting at the beginning of the bit vector, i ∈ I j = [α j , β j ) with α j = 0 and X hj αj −1 .…”
Section: Second-order Languagesmentioning
confidence: 99%
See 1 more Smart Citation