by nexgentech | Oct 25, 2017 | ieee project
EFFICIENT DELEGATED PRIVATE SET INTERSECTION ON OUTSOURCED PRIVATE DATASETS ABSTRACT Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloudcomputing power and popularity have been swiftly growing, it...
by nexgentech | Oct 25, 2017 | ieee project
A SCALABLE APPROACH TO JOINT CYBER INSURANCEAND SECURITY-AS-A-SERVICE PROVISIONING IN CLOUDCOMPUTING ABSTRACT As computing services are increasingly cloud-based, corporationsare investing in cloud-based security measures. The Security-asa-Service(SECaaS) paradigm...
by nexgentech | Oct 25, 2017 | ieee project
EFFICIENT MULTI-FACTOR AUTHENTICATED KEYEXCHANGE SCHEME FOR MOBILE COMMUNICATIONS ABSTRACT Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interactswith a server to set up a session key where...
by nexgentech | Oct 25, 2017 | ieee project
DESIGN AND IMPLEMENTATION OF THE ASCEND SECURE PROCESSOR ABSTRACT This paper presents hardware implementations of the Ascend secure processor, prototyped on an FPGA and taped out in a32 nm SOI process. Ascend prevents information leakage over a processor’s digital...
by nexgentech | Oct 25, 2017 | ieee project
CRYPTOGRAPHIC SOLUTIONS FOR CREDIBILITY AND LIABILITY ISSUES OF GENOMIC DATA ABSTRACT In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from hisgenomic data) with a service provider. In this scenario, (i)...
by nexgentech | Oct 25, 2017 | ieee project
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING FOLKSONOMY DATA ABSTRACT Query expansion has been widely adopted in Web search as a way of tackling the ambiguity of queries.Personalized search utilizing folksonomy data has demonstrated...