[go: up one dir, main page]

Odelberg et al., 2014 - Google Patents

Distributed cipher chaining for increased security in password storage

Odelberg et al., 2014

View PDF
Document ID
15975679733484683091
Author
Odelberg D
Holm C
Publication year

External Links

Snippet

As more services move on to the web and more people use the cloud for storage of important information, it is important that providers of such services can guarantee that information is kept safe. The most common way of protecting that data is to make it …
Continue reading at www.diva-portal.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN106534092B (en) A message-dependent key-based encryption method for private data
Zhou et al. Certificateless public key encryption with cryptographic reverse firewalls
Wang et al. Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme
Schillinger et al. End-to-end encryption schemes for online social networks
US20160359822A1 (en) Sovereign share encryption protocol
Mitra et al. Prevention of the man-in-the-middle attack on Diffie–Hellman key exchange algorithm: A review
WO2018043573A1 (en) Key exchange method and key exchange system
Mun et al. A novel secure and efficient hash function with extra padding against rainbow table attacks
Lee et al. Secure and efficient protection for HTTP cookies with self‐verification
Das et al. A decentralized open web cryptographic standard
Fun et al. Enhanced security for public cloud storage with honey encryption
Yevseiev et al. The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes
Zhang et al. Group key management protocol for file sharing on cloud storage
Barenghi et al. Snake: An end-to-end encrypted online social network
Jiang et al. QPause: Quantum-resistant password-protected data outsourcing for cloud storage
Kobeissi An analysis of the protonmail cryptographic architecture
Naher et al. Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC
Farash et al. A provably secure and efficient two‐party password‐based explicit authenticated key exchange protocol resistance to password guessing attacks
Odelberg et al. Distributed cipher chaining for increased security in password storage
Kodada FSAaCIT: finite state automata based one-key cryptosystem and chunk-based indexing technique for secure data de-duplication in cloud computing
Chen et al. A hill cipher‐based remote data possession checking in cloud storage
Basu et al. Secured hierarchical secret sharing using ECC based signcryption
Haller Cloud storage systems: From bad practice to practical attacks
Nazarov et al. An architecture model for active cyber attacks on intelligence info-communication systems: Application based on advance system encryption (AES-512) using pre-encrypted search table and pseudo-random Functions (PRFs)
Yap et al. On the security of a lightweight authentication and encryption scheme for mobile ad hoc network