Odelberg et al., 2014 - Google Patents
Distributed cipher chaining for increased security in password storageOdelberg et al., 2014
View PDF- Document ID
- 15975679733484683091
- Author
- Odelberg D
- Holm C
- Publication year
External Links
Snippet
As more services move on to the web and more people use the cloud for storage of important information, it is important that providers of such services can guarantee that information is kept safe. The most common way of protecting that data is to make it …
- 238000003860 storage 0 title abstract description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534092B (en) | A message-dependent key-based encryption method for private data | |
Zhou et al. | Certificateless public key encryption with cryptographic reverse firewalls | |
Wang et al. | Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme | |
Schillinger et al. | End-to-end encryption schemes for online social networks | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
Mitra et al. | Prevention of the man-in-the-middle attack on Diffie–Hellman key exchange algorithm: A review | |
WO2018043573A1 (en) | Key exchange method and key exchange system | |
Mun et al. | A novel secure and efficient hash function with extra padding against rainbow table attacks | |
Lee et al. | Secure and efficient protection for HTTP cookies with self‐verification | |
Das et al. | A decentralized open web cryptographic standard | |
Fun et al. | Enhanced security for public cloud storage with honey encryption | |
Yevseiev et al. | The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes | |
Zhang et al. | Group key management protocol for file sharing on cloud storage | |
Barenghi et al. | Snake: An end-to-end encrypted online social network | |
Jiang et al. | QPause: Quantum-resistant password-protected data outsourcing for cloud storage | |
Kobeissi | An analysis of the protonmail cryptographic architecture | |
Naher et al. | Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC | |
Farash et al. | A provably secure and efficient two‐party password‐based explicit authenticated key exchange protocol resistance to password guessing attacks | |
Odelberg et al. | Distributed cipher chaining for increased security in password storage | |
Kodada | FSAaCIT: finite state automata based one-key cryptosystem and chunk-based indexing technique for secure data de-duplication in cloud computing | |
Chen et al. | A hill cipher‐based remote data possession checking in cloud storage | |
Basu et al. | Secured hierarchical secret sharing using ECC based signcryption | |
Haller | Cloud storage systems: From bad practice to practical attacks | |
Nazarov et al. | An architecture model for active cyber attacks on intelligence info-communication systems: Application based on advance system encryption (AES-512) using pre-encrypted search table and pseudo-random Functions (PRFs) | |
Yap et al. | On the security of a lightweight authentication and encryption scheme for mobile ad hoc network |