Abstract
Through this paper, I am going to show you how you can use data encryption to effectively secure your files and databases.
- Data85. "Understanding DES: The Data Encryption Standard," IS80, 200-101, Datapro Research Corporation, Delran, N.J. (June 1985)Google Scholar
- Denn83. Denning, Dorothy E., Cryptography and Data Security, Addison-Wesley, Reading, MA (1983) Google ScholarDigital Library
- NBS77. "Data Encryption Standard," FIPS PUB 46, U.S. Dept. of Commerce/National Bureau of Standards, Washington, DC (January 1977)Google Scholar
- NBS80a. "Guidelines for Security of Computer Applications," FIPS PUB 73, U.S. Dept. of Commerce/National Bureau of Standards, Washington, DC (June 1980)Google Scholar
- NBS80b. "DES Modes of Operation," FIPS PUB 81, U.S. Dept. of Commerce/National Bureau of Standards, Washington, DC (December 1980)Google Scholar
- NBS81. "Guidelines for Implementing and Using the NBS Data Encryption Standard," FIPS PUB 74, U.S. Dept. of Commerce/National Bureau of Standards, Washington, DC (April 1981)Google Scholar
Index Terms
- How you can use the data encryption standard to encrypt your files and data bases
Recommendations
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another ...
A Fully Secure Revocable ID-Based Encryption in the Standard Model
Revocation problem is a critical issue for key management of public key systems. Any certificate-based or identity (ID)-based public key systems must provide a revocation method to revoke misbehaving/compromised users from the public key systems. In the ...
Practical certificateless public key encryption in the standard model
NSS'12: Proceedings of the 6th international conference on Network and System SecurityCertificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography without using public key certificates. In this paper, we investigate certificateless encryption (CLE) scheme whose security does not ...
Comments