DocumentCode
175209
Title
Cryptographic Techniques in Advanced Information Management
Author
Ogiela, Marek R. ; Ogiela, Lidia ; Ogiela, Urszula
Author_Institution
Cryptography & Cognitive Inf. Res. Group, AGH Univ. of Sci. & Technol., Krakow, Poland
fYear
2014
fDate
2-4 July 2014
Firstpage
254
Lastpage
257
Abstract
The paper presents new solutions in the area of application cryptographic protocols for strategic or personal information protection and management. Computer techniques for classified information protection and distribution will be described in the context of application for security purposes personal or biometric information. Such techniques may also support the management processes of confidential data, and distribution of parts of shared information in large management structures. Development of presented algorithms will enable the reconstruction of secured information exclusively by the confidants with access to the secret, and parts of the information shared - i.e. by the authorized users of shared information. At the same time the proposed information division techniques will effectively secure data against unauthorized access to encrypted information.
Keywords
authorisation; cryptographic protocols; data protection; information management; confidential data management; cryptographic protocols; information management; information protection; unauthorized information access; Algorithm design and analysis; Companies; Cryptography; Information management; Pragmatics; Protocols; Cryptographic protocols; bio-inspired cryptography; secret sharing algorithms;
fLanguage
English
Publisher
ieee
Conference_Titel
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on
Conference_Location
Birmingham
Print_ISBN
978-1-4799-4333-3
Type
conf
DOI
10.1109/IMIS.2014.31
Filename
6975472
Link To Document