Toro et al., 2020 - Google Patents
Implementation of an elliptic curve encryption to a databaseToro et al., 2020
- Document ID
- 3063710383468110438
- Author
- Toro E
- Romero C
- Bernal P
- Publication year
- Publication venue
- International Conference on Applied Technologies
External Links
Snippet
The encryption process is very important for various applications that cover the treatment of sensitive information since it allows the protection of information stored in databases from external agents, providing security and trust to the user. The elliptic curve encryption model …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Velliangiri et al. | An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography | |
CN111143474B (en) | A method of one-click exchange and binding of mobile phone numbers based on blockchain technology | |
Lee et al. | An improved anonymous authentication scheme for roaming in ubiquitous networks | |
Rao et al. | R-PEKS: RBAC enabled PEKS for secure access of cloud data | |
Sharma et al. | A two-tier security solution for storing data across public cloud | |
Salvakkam et al. | An improved lattice based certificateless data integrity verification techniques for cloud computing | |
WO2021098152A1 (en) | Blockchain-based data processing method, device, and computer apparatus | |
Al-Khafaji et al. | Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise | |
Mahinderjit Singh et al. | A novel out-of-band biometrics authentication scheme for wearable devices | |
Ogunleye et al. | Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment | |
Gomaa et al. | Virtual identity approaches evaluation for anonymous communication in cloud environments | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Jaithunbi et al. | Preservation of data integrity in public cloud using enhanced vigenere cipher based obfuscation | |
Vamsi et al. | Electronic health record security in cloud: Medical data protection using homomorphic encryption schemes | |
Ali et al. | Data Inspection and Access Control for 5 G Edge Computing-Enabled Internet of Medical Things | |
Toro et al. | Implementation of an elliptic curve encryption to a database | |
Mahto et al. | Security improvement of one-time password using crypto-biometric model | |
Akmal et al. | Enhancing the security of data in cloud computing environments using Remote Data Auditing | |
Rao et al. | Hybrid security approach for database security using diffusion based cryptography and diffie-hellman key exchange algorithm | |
Ould-Yahia et al. | Towards privacy and ownership preserving of outsourced health data in IoT-cloud context | |
Narula et al. | A novel review on healthcare data encryption techniques | |
Pawar et al. | Implementation of secure authentication scheme and access control in cloud computing | |
Filaly et al. | Hybrid Encryption Algorithm for Information Security in Hadoop | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Dawson et al. | Cryptographic Solutions for Data Security in Cloud Computing:: A Run Time Trend-based Comparison of NCS, ERSA, and EHS |