Zobrazeno 1 - 10
of 406
pro vyhledávání: '"Buchmann, Johannes A."'
Autor:
Walter, Uwe, Buchmann, Johannes, Sülldorf, Anne, Dück, Alexander, Russnak, Antonia, Hässler, Frank, Berger, Christoph
Publikováno v:
In Journal of Psychiatric Research August 2024 176:18-22
Autor:
Geihs, Matthias, Buchmann, Johannes
An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents) whose integrity and confidentiality must
Externí odkaz:
http://arxiv.org/abs/1810.11888
Autor:
Geihs, Matthias, Nikiforov, Oleg, Demirel, Denise, Sauer, Alexander, Butin, Denis, Günther, Felix, Alber, Gernot, Walther, Thomas, Buchmann, Johannes
Sensitive digital data, such as health information or governmental archives, are often stored for decades or centuries. The processing of such data calls for long-term security. Secure channels on the Internet require robust key establishment methods
Externí odkaz:
http://arxiv.org/abs/1711.09793
Publikováno v:
Proceedings of SCC@ASIACCS 2018, pages 39-48
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries
Externí odkaz:
http://arxiv.org/abs/1711.09805
Publikováno v:
ASIACCS 2017, pages 436-448
Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop prot
Externí odkaz:
http://arxiv.org/abs/1708.02091
It is practically impossible for users to memorize a large portfolio of strong and individual passwords for their online accounts. A solution is to generate passwords randomly and store them. Yet, storing passwords instead of memorizing them bears th
Externí odkaz:
http://arxiv.org/abs/1704.02883
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which ca
Externí odkaz:
http://arxiv.org/abs/1506.04549
Publikováno v:
Journal of Mathematical Cryptology, Vol 13, Iss 1, Pp 47-67 (2019)
The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht, Player and Scott presented the software tool LWE-Estimator to estimate the hardness of con
Externí odkaz:
https://doaj.org/article/67dce5e0f6964e75991368795acb3c99
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.