Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Gerard Memmi"'
Publikováno v:
Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.157-165. ⟨10.1007/s12243-018-0684-x⟩
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.157-165. ⟨10.1007/s12243-018-0684-x⟩
Data fragmentation and dispersion is recognized as a way of providing confidentiality and availability of data stored inside unattended wireless sensor networks. This paper introduces an additively homomorphic encryption and fragmentation scheme (AHE
Publikováno v:
CSCloud/EdgeCom
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Jun 2019, Paris, France. pp.7-9, ⟨10.1109/CSCloud/EdgeCom.2019.00011⟩
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Jun 2019, Paris, France. pp.7-9, ⟨10.1109/CSCloud/EdgeCom.2019.00011⟩
The Secure Fragmentation and Dispersal (SFD) scheme fragments and disperses encrypted data over at least two storage clouds. It increases the space complexity of a bruteforce search that has to be performed by an attacker unable to compromise the tot
Autor:
Katarzyna Kapusta, Gerard Memmi
Publikováno v:
Security and Trust Management ISBN: 9783030011406
STM
STM
Data fragmentation and dispersal over several independent locations enhances protection level of outsourced data. In this paper, we introduce a Fast and Scalable Fragmentation Algorithm (FSFA) that is particularly well adapted to be used in a multi-c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f8ad7d3d4befefe26bf745d741eabd18
https://doi.org/10.1007/978-3-030-01141-3_4
https://doi.org/10.1007/978-3-030-01141-3_4
Publikováno v:
4th IEEE Int. Conf. on Cyber Security and Cloud Computing
4th IEEE Int. Conf. on Cyber Security and Cloud Computing, Jun 2017, New-York, United States. pp.108-113
CSCloud
4th IEEE Int. Conf. on Cyber Security and Cloud Computing, Jun 2017, New-York, United States. pp.108-113
CSCloud
In this paper, an efficient secure storage scheme is presented which aims to provide security to end-user's data while mostly storing it to public clouds. This proposed scheme is based on the invertible Discrete Wavelet Transform (DWT) to fragment da
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bf13b01796088bb289b898c5ce96cad9
https://hal.telecom-paris.fr/hal-02287645
https://hal.telecom-paris.fr/hal-02287645
Autor:
Gerard Memmi, Katarzyna Kapusta
Publikováno v:
CFIP-Notere
CFIP-Notere, Jul 2015, Paris, France
CFIP/NOTERE
CFIP-Notere, Jul 2015, Paris, France
CFIP/NOTERE
This paper analyzes different dispersed storage systems that use data fragmentation as a way of protection. Existing solutions have been organized into two categories: those operating on unstructured data and in a uniform environment, and those havin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::74d95fac07c382785ac46e0000ebb640
https://hal.telecom-paris.fr/hal-02288464
https://hal.telecom-paris.fr/hal-02288464