2,270 resources related to Data Encryption
- Topics related to Data Encryption
- IEEE Organizations related to Data Encryption
- Conferences related to Data Encryption
- Periodicals related to Data Encryption
- Most published Xplore authors for Data Encryption
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
The DATE conference addresses all aspects of research into technologies for electronic andembedded system engineering. It covers the design process, test, and automation tools forelectronics ranging from integrated circuits to distributed embedded systems. This includes bothhardware and embedded software design issues. The conference scope also includes theelaboration of design requirements and new architectures for challenging application fields suchas telecoms, wireless communications, multimedia, healthcare, smart energy and automotivesystems. Companies also present innovative industrial designs to foster the feedback fromrealworld design to research. DATE also hosts a number of special sessions, events within themain technical programme such as panels, hot-topic sessions, tutorials and workshopstechnical programme such as panels, hot-topic sessions, tutorials and workshops.
2019 IEEE International Symposium on Information Theory (ISIT)
Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.
The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.
Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
2018 15th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2018
Physical-layer data encryption schemes are required to enhance the data security during transmission in passive optical networks (PONs). Encryption schemes using digital chaos provide a huge key space which results in high- level security for the user data. Here, a novel physical-layer encryption scheme using chaotic radial constellation rotation is proposed and experimentally demonstrated for orthogonal frequency division multiplexing PON ...
2010 10th IEEE International Conference on Computer and Information Technology, 2010
Data encryption process can easily be quite complicated and usually requires significant computation time and power despite significant simplifications. This paper discusses about pipelined and non-pipelined implementation of one of the most commonly used symmetric encryption algorithm, Data Encryption Standard (DES). The platform used for this matter is, Xilinx new high performance silicon foundation, Virtex-6 Field Programmable Gate Array technology. ...
2018 20th International Conference on Transparent Optical Networks (ICTON), 2018
This paper proposes a multi-fold optical frequency hopping (FH) scheme based on hyper digital chaos. The multi-fold data encryption is achieved by the incorporation of chaotic sequences into traditional FH scheme, where a hyper digital chaos is implemented to generate the optical carrier frequency, FH rate as well as the available frequency set respectively. As a result, a huge key ...
2017 IEEE International Conference on Big Data and Smart Computing (BigComp), 2017
Hadoop is developed as a distributed data processing platform for analyzing big data. Enterprises can analyze big data containing users' sensitive information by using Hadoop and utilize them for their marketing. Therefore, researches on data encryption have been widely done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES international standard ...
China Communications, 2014
To enhance the security of user data in the clouds, we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded. Firstly, the adopted data encryption algorithm is not static and uniform. For each encryption, this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone ...
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Array Transversing through strings
Honors 2020: Cynthia Dwork Wins the IEEE Richard W. Hamming Medal
Ted Tours the Brooklyn 5G Summit Expo Floor
Computer: Alan Turing at Bletchley Park
John S. Baras accepts the IEEE Simon Ramo Medal - Honors Ceremony 2017
"Do you trust me?" vs "Can I trust you?" Root of Trust Within My Connected Symbiotic Autonomous Systems - John Budenske
Big Data Analytics: Tools and Technologies - Big Data Analytics Tutorial Part 2
Estimating Sparse Eigenstructure for High Dimensional Data
Human-Guided Video Data Collection in Marine Environnment
Explorations in BIG Data and sMall Data with a Fuzzy Perspective
Mahmoud Daneshmand on IoT and Big Data Analytics: IoT: Even Bigger Data
Concept of Arrays
Big Data and Analytics at Verizon
Q&A with Dr. Sorel Reisman: IEEE Big Data Podcast, Episode 2
TechNews: Big Data
Temporal Pattern Mining in Symbolic Time Point and Time Interval Data
Q&A with Dr. Ling Liu: IEEE Big Data Podcast, Episode 8
Deep Learning and the Representation of Natural Data
Physical-layer data encryption schemes are required to enhance the data security during transmission in passive optical networks (PONs). Encryption schemes using digital chaos provide a huge key space which results in high- level security for the user data. Here, a novel physical-layer encryption scheme using chaotic radial constellation rotation is proposed and experimentally demonstrated for orthogonal frequency division multiplexing PON (OFDM-PON). A one-dimensional (1D) chaos is employed to generate the digital chaotic sequences for data encryption. The proposed encryption scheme offers less computational complexity due to the use of 1D chaos. The initial values are pre-shared between the optical line terminal (OLT) and optical network unit (ONU), which provide a key space of 10<sup>15</sup>. At the OLT, the original data is firstly encrypted by a chaotic XOR operation, and then further encrypted using the chaotic phase offsets. This multi-fold encryption generates an overall key space of 10<sup>30</sup>. The proposed encryption scheme is verified by experiments, where a 9.4-Gb/s encrypted 16 quadrature amplitude modulation (16-QAM) optical OFDM signal transmission is successfully carried over 20 km standard single-mode fiber (SSMF). The bit error rate (BER) of the received encrypted signal was calculated for a legitimate ONU as well as an illegal ONU. The encrypted OFDM signal is also compared with the original OFDM signal for performance analysis. The transmission performance is improved for the proposed encryption scheme due to the reason that the introduction of chaotic radial rotation reduces the effect of phase noise in the encrypted OFDM signals.
Data encryption process can easily be quite complicated and usually requires significant computation time and power despite significant simplifications. This paper discusses about pipelined and non-pipelined implementation of one of the most commonly used symmetric encryption algorithm, Data Encryption Standard (DES). The platform used for this matter is, Xilinx new high performance silicon foundation, Virtex-6 Field Programmable Gate Array technology. Finite state machine is used only in non-pipelined implementation, and it is not implemented for the pipelined approach. The testing of the implemented design shows that it is possible to generate data in 16 clock cycles when non-pipelined approach is employed. When pipelined approach is employed on the other hand, 17 clock signals are required for the initial phase only, and one clock signal is sufficient afterwards for each data generation cycle. The Very High Speed Integrated Circuit Hardware Description Language (VHDL) is used to program the design.
This paper proposes a multi-fold optical frequency hopping (FH) scheme based on hyper digital chaos. The multi-fold data encryption is achieved by the incorporation of chaotic sequences into traditional FH scheme, where a hyper digital chaos is implemented to generate the optical carrier frequency, FH rate as well as the available frequency set respectively. As a result, a huge key space of 1058is provided in the proposed multi-fold data encryption. The performances of data transmission and security enhancement of the proposed FH scheme are simulated and analyzed in details.
Hadoop is developed as a distributed data processing platform for analyzing big data. Enterprises can analyze big data containing users' sensitive information by using Hadoop and utilize them for their marketing. Therefore, researches on data encryption have been widely done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES international standard data encryption algorithm. Meanwhile, the Korean government selected ARIA algorithm as a standard data encryption scheme for domestic usages. In this paper, we propose a HDFS data encryption scheme which supports both ARIA and AES algorithms on Hadoop. First, the proposed scheme provides a HDFS block-splitting component that performs ARIA/AES encryption and decryption under the Hadoop distributed computing environment. Second, the proposed scheme provides a variable-length data processing component that can perform encryption and decryption by adding dummy data, in case when the last data block does not contains 128-bit data. Finally, we show from performance analysis that our proposed scheme is efficient for various applications, such as word counting, sorting, k-Means, and hierarchical clustering.
To enhance the security of user data in the clouds, we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded. Firstly, the adopted data encryption algorithm is not static and uniform. For each encryption, this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system. From the mobile phone's character, the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information, personalization information and a pseudo-random number. Secondly, the data is rearranged with a randomly selected start position in the data before being encrypted. The start position's randomness makes the mobile phone data encryption safer. Thirdly, the rearranged data is encrypted by the selected algorithm and generated key. Finally, the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process.
The Data Encryption Standard (DES) was the first modern and the most popular symmetric key algorithm used for encryption and decryption of digital data. Even though it is nowadays not considered secure against a determined attacker, it is still used in legacy applications. This paper presents a secure, high-throughput and area-efficient Field Programming Gate Arrays (FPGA) implementation of the Data Encryption Standard algorithm. This is achieved by combining 16 pipelining concept with time variable permutations and compared with previous illustrated encryption algorithms. The permutations change on time by the cryptographer. Therefore, the ciphertext changes too for the same key and plaintext. The proposed algorithm is implemented on Xilinx Spartan-3e (XC3s500e) FPGA. Our DES design achieved a data encryption rate of 9453.47 Gbit/s and 2046 number of occupied CLB slices. These results showed that the proposed implementation is one of the fastest hardware implementations with better area-efficient and much greater security.
This paper presents a new method for data encryption. Its encryption scheme is based on replacement of the data values. The data values are replaced using a progressive cellular automata (CA) substitution. In the progressive CA substitution, the key stream is generated from the non-uniform 2-D N/spl times/N von Neumann cellular automata, that is a special type of discrete cellular neural networks (CNN). The characteristics of the proposed encryption method are loss-less, symmetric private key encryption, very large number of security keys, key-dependent permutation, and key-dependent pixel value replacement. Simulation results for color images show that the proposed data encryption method satisfies the properties of confusion and diffusion due to the CA substitution is wonderful.
Data encryption is one of the active strategy of information security, which can provide strong protection. A chaos dynamic logistic model was chosen as the data encryption algorithm in this paper, then randomness, correlation, complexity of logistic chaotic series were verified through power spectrum, Lyapunov exponent mathematical analysis and it meets the needs of cryptology. Meanwhile, in theory and experiment, we know this algorithm has high security and robustness, it can resist differential analysis and linearity cypher analysis.
Encryption of data is of utmost importance for secure transmission. Traditional keyword search techniques downloading all the data and decrypting locally is clearly impractical, due to the huge amount of bandwidth cost in cloud scale systems. This paper presents a methodology for encrypting the data for limited reserved strings that are stored in Counting Bloom Filters (CBF). CBF is a small array of element addresses that are connected to the array through a hashing mechanism. Counting bloom filter is used for increasing the speed of the set membership tests. If the string is a member of counting bloom filter it is encrypted using Data Encryption Standard, else the string is transmitted without encryption. This reduces the effective time for encryption and increases security.
With rapid growing of mobile networks and devices we can use them to send email, mobile commerce, theatre booking, etc. In such scenario, we need to Secure Communication. Secure communication is possible through encryption of data. However, most of the existing data encryption techniques are location- independent. Data encrypted with such techniques cannot restrict the location and time of data decryption. The concept of “Geoencryption” or “location-based encryption” is being developed for such a purpose. In this paper, we are going to investigate weaknesses in existing Geoencryption systems and propose some solutions for increasing the safety and reliability in these systems. For this purpose we present a new geoencryption protocol that will allow mobile nodes to communicate to each other safely by restrict decoding a message in the specific location and time. Receiver can only decrypt the Ciphertext when the coordinate acquired form GPS receiver matches with the target coordinate. According to our experimental study, the approach can meet the confidentiality, authentication, simplicity, and practicability of security issues. As a result, the proposed approaches can improve the security and confidentiality in Geoencryption systems.
his standard revises and enhances the VHDL language reference manual (LRM) by including a standard C language interface specification; specifications from previously separate, but related, standards IEEE Std 1164 -1993,1 IEEE Std 1076.2 -1996, and IEEE Std 1076.3-1997; and general language enhancements in the areas of design and verification of electronic systems.
This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.
The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...
This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.
Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...
Software Engineer, Emerging Technologies
Software Engineer, Emerging Technologies
Software Engineer, Emerging Technologies
Senior Software Engineer
Senior Data Engineer - Ad Platforms
Data Products Engineering Manager, Ad Platforms