Discrete mathematics and its applications (2nd ed.)
Discrete mathematics and its applications (2nd ed.)
A new group key generating model for group sharing
Information Sciences: an International Journal
A probability model for reconstructing secret sharing under the Internet environment
Information Sciences: an International Journal
Communications of the ACM
Cryptography and data security
Cryptography and data security
A two-tier data dissemination model for large-scale wireless sensor networks
Proceedings of the 8th annual international conference on Mobile computing and networking
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
A nonlinear secret sharing scheme
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
Secure Fault Tolerance in Wireless Sensor Networks
CITWORKSHOPS '08 Proceedings of the 2008 IEEE 8th International Conference on Computer and Information Technology Workshops
On supporting distributed collaboration in sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Securing wireless sensor networks against aggregator compromises
IEEE Communications Magazine
Recursive secret sharing for distributed storage and information hiding
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Hybrid microdata using microaggregation
Information Sciences: an International Journal
A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Space efficient secret sharing for implicit data security
Information Sciences: an International Journal
An Efficient Quasigroup Block Cipher
Wireless Personal Communications: An International Journal
Hi-index | 0.07 |
It is advantageous to use implicit security for online data storage in a cloud computing environment. We describe the use of a data partitioning scheme for implementing such security involving the roots of a polynomial in finite field. The partitions are stored on randomly chosen servers on the network and they need to be retrieved to recreate the original data. Data reconstruction requires access to each server, login password and the knowledge of the servers on which the partitions are stored. This scheme may also be used for data security in sensor networks and internet voting protocols.