Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices.
Paolo GastiYu ChenPublished in: PDP (2010)
Keyphrases
- data security
- encryption scheme
- mobile devices
- access control
- data centric
- data privacy
- data sharing
- data management
- data integrity
- secret key
- public key
- privacy preserving data mining
- lossless compression
- privacy preserving
- distributed databases
- hash functions
- information security
- database design
- information sharing
- cloud computing
- input data
- data model
- query processing