[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Toro et al., 2020 - Google Patents

Implementation of an elliptic curve encryption to a database

Toro et al., 2020

Document ID
3063710383468110438
Author
Toro E
Romero C
Bernal P
Publication year
Publication venue
International Conference on Applied Technologies

External Links

Snippet

The encryption process is very important for various applications that cover the treatment of sensitive information since it allows the protection of information stored in databases from external agents, providing security and trust to the user. The elliptic curve encryption model …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Similar Documents

Publication Publication Date Title
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
CN111143474B (en) A method of one-click exchange and binding of mobile phone numbers based on blockchain technology
Lee et al. An improved anonymous authentication scheme for roaming in ubiquitous networks
Rao et al. R-PEKS: RBAC enabled PEKS for secure access of cloud data
Sharma et al. A two-tier security solution for storing data across public cloud
Salvakkam et al. An improved lattice based certificateless data integrity verification techniques for cloud computing
WO2021098152A1 (en) Blockchain-based data processing method, device, and computer apparatus
Al-Khafaji et al. Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
Mahinderjit Singh et al. A novel out-of-band biometrics authentication scheme for wearable devices
Ogunleye et al. Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
Gomaa et al. Virtual identity approaches evaluation for anonymous communication in cloud environments
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Jaithunbi et al. Preservation of data integrity in public cloud using enhanced vigenere cipher based obfuscation
Vamsi et al. Electronic health record security in cloud: Medical data protection using homomorphic encryption schemes
Ali et al. Data Inspection and Access Control for 5 G Edge Computing-Enabled Internet of Medical Things
Toro et al. Implementation of an elliptic curve encryption to a database
Mahto et al. Security improvement of one-time password using crypto-biometric model
Akmal et al. Enhancing the security of data in cloud computing environments using Remote Data Auditing
Rao et al. Hybrid security approach for database security using diffusion based cryptography and diffie-hellman key exchange algorithm
Ould-Yahia et al. Towards privacy and ownership preserving of outsourced health data in IoT-cloud context
Narula et al. A novel review on healthcare data encryption techniques
Pawar et al. Implementation of secure authentication scheme and access control in cloud computing
Filaly et al. Hybrid Encryption Algorithm for Information Security in Hadoop
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Dawson et al. Cryptographic Solutions for Data Security in Cloud Computing:: A Run Time Trend-based Comparison of NCS, ERSA, and EHS