Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
139,815
result(s) for
"Data encryption"
Sort by:
Serious cryptography : a practical introduction to modern encryption
'Serious Cryptography' is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman and elliptic curves, as well as TLS and post-quantum cryptography.
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
by
Srinivasa Rao, Madala
,
Hemalatha, Kivudujogappa Lingappa
,
Lai, Wen Cheng
in
Access control
,
Algorithms
,
Analysis
2022
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple Data Encryption Standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in Data Encryption Standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.
Journal Article
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
2022
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.
Journal Article
Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
by
Awadh, Wid Akeel
,
Hashim, Mohammed S.
,
Alasady, Ali Salah
in
Algorithms
,
Big Data
,
Blockchain
2024
Recently, big data analysis has been a very active research area with a significant impact on industrial and scientific domains. Thus, the security of big data provides the conditions for securing and monitoring cloud applications that need protect highly sensitive data hosted in cloud platforms. Nevertheless, the big data security issues have become increasingly problematic, leading organizations to restrict the utilization of cloud services. The existing security methods have revealed several issues, including a weakness of data security and Inaccuracy in data analysis, inefficiencies in performance and dependence on a third party. To address these issues, this study proposed a simpler technique as known a triple-data encryption standard (IDES) through providing the long keys sizes in Data Encryption Standard (DES) to protect the privacy of data against the potential attack in cloud computing environments. The experimental results conf rm the efficiency of the proposed method in enhancing the secure of big healthcare data storage in cloud computing environment with less computational time compared to the existing method of Intelligent Framework for Healthcare Data Security. In conclusion, the proposed IDES is recommended as a candidate encryption and decryption method in healthcare applications in cloud computing environments.
Journal Article
Everyday cryptography : fundamental principles and applications
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the internet, mobile phones, WiFi networks, payment cards, Tor, and Bitcoin.
Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)
2018
Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.
Journal Article
Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission
by
Ramírez-Villalobos, Ramón
,
Cárdenas-Valdez, José Ricardo
,
Ramirez-Ubieta, Catherine
in
Algorithms
,
Cardiac arrhythmia
,
Cardiovascular disease
2024
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF wireless transmission is essential due to the increasing demand for secure telemedicine communications. This paper presents an innovative chaotic-based encryption system designed to enhance the security and integrity of telemedicine data transmission. The proposed system utilizes a multi-scroll chaotic system for ECG signal encryption based on master–slave synchronization. The ECG signal is encrypted by a master system and securely transmitted to a remote location, where it is decrypted by a slave system using an extended state observer. Synchronization between the master and slave is achieved through the Lyapunov criteria, which ensures system stability. The system also supports Orthogonal Frequency Division Multiplexing (OFDM) and adaptive n-quadrature amplitude modulation (n-QAM) schemes to optimize signal discretization. Experimental validations with a custom transceiver scheme confirmed the system’s effectiveness in preventing channel overlap during 2.5 GHz transmissions. Additionally, a commercial RF Power Amplifier (RF-PA) for LTE applications and a development board were integrated to monitor transmission quality. The proposed encryption system ensures robust and efficient RF transmission of ECG data, addressing critical challenges in the wireless communication of sensitive medical information. This approach demonstrates the potential for broader applications in modern telemedicine environments, providing a reliable and efficient solution for the secure transmission of healthcare data.
Journal Article