Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 3 of 3
Full-Text Articles in Information Security
Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson
Transferable Multiparty Computation, Michael R. Clark, Kenneth M. Hopkinson
AFIT Patents
A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation. Inputs for computation associated with each party in the set of first parties are divided into shares to be sent to other parties in the set of first parties. The computation on the shares is performed by the set of first parties using multiparty computation functions. In response to a trigger event, shares of the set of first parties are transferred to a set of second parties selected from a plurality of second parties. The …
Genomic Security (Lest We Forget), Tatiana Bradley, Xuhua Ding, Gene Tsudik
Genomic Security (Lest We Forget), Tatiana Bradley, Xuhua Ding, Gene Tsudik
Research Collection School Of Computing and Information Systems
Genomic privacy has attracted much attention from the research community, because its risks are unique and breaches can lead to terrifying leakage of sensitive information. The less-explored topic of genomic security must address threats of digitized genomes being altered, which can have dire consequences in medical or legal settings.
A Centralised Platform For Digital Forensic Investigations In Cloud-Based Environments, Shaunak Mody, Alastair Nisbet
A Centralised Platform For Digital Forensic Investigations In Cloud-Based Environments, Shaunak Mody, Alastair Nisbet
Australian Digital Forensics Conference
Forensic investigations of digital media traditionally involve seizing a device and performing a forensic investigation. Often legal and physical obstructions must be overcome so that the investigator has access to the device and the right to secure it for investigation purposes. Taking a forensic image of a hard disk may need to be done in the field but analysis can usually be performed at a later time. With the rapid increase in hard disk size, the acquiring of a forensic image can take hours or days. This poses significant issues for forensic investigators when potential evidence resides in the cloud. …