Back to Results
First PageMeta Content
ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography


Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara
Add to Reading List

Document Date: 2014-12-16 09:55:41


Open Document

File Size: 470,47 KB

Share Result on Facebook

City

Pairing / /

Company

Lawrence Berkeley National Laboratory / AES / CBC / Cisco Systems / Intel / Sashank Dara Nalini Niranjan Cisco Systems India Pvt. Ltd / Cisco Systems India Pvt. Ltd / /

/

Facility

Pvt. Ltd Nitte Meenakshi Institute of Technology Bangalore / Nitte Meenakshi Institute of Technology Bangalore / /

IndustryTerm

remote server / communications security / search keywords w1 / flow monitoring devices / real-time flow monitoring devices / search keyword / privacy preserving search / data search / hidden keyword search / keyword search / generation server / /

MarketIndex

S&P 2000 / /

OperatingSystem

Ubuntu / /

Organization

Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara Nalini Niranjan Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Bangalore / Nitte Meenakshi Institute of Technology Bangalore / Stanford / /

Person

V.N. Muralidhara / /

Position

research supervisor / auditor / /

Product

Type / Franklin / /

ProvinceOrState

Karnataka / /

Technology

Encryption / cryptography / RAM / predicate encryption / selective-id secure identity-based encryption / public key / Searchable symmetric encryption / Ciphertext-Policy AttributeBased encryption / data encryption / Identity-based encryption / private key / HMAC SHA1 algorithm / secret key / SSL / Fuzzy identity-based encryption / AttributeBased encryption / Attribute-based encryption / Public key encryption / CP-ABE encryption / SHA HMAC algorithm / /

URL

http /

SocialTag