University of Asia and the Pacific

Displaying 1-4 of 4 results

  • White Papers // May 2013

    Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security

    For searching keywords against encrypted data, the Public key Encryption scheme with Keyword Search (PEKS), and it's an extension called Secure-Channel Free PEKS (SCF-PEKS) have been proposed. In SCF-PEKS, a receiver makes a trapdoor for a keyword, and uploads it on a server. A sender computes an encrypted keyword, and...

    Provided By University of Asia and the Pacific

  • White Papers // Jun 2012

    Private Two-Party Set Intersection Protocol in Rational Model

    Many data mining algorithms use privacy preserving set intersection operations. Private set operations have considered semi-honest and malicious adversarial models in cryptographic settings. Protocols in semi-honest model, requiring light computations, provide weak security. Protocols in malicious model guarantee strong security at the price of expensive computations like homomorphic encryption and...

    Provided By University of Asia and the Pacific

  • White Papers // May 2012

    Adoption of B2B e-Commerce by the SMEs in Bangladesh

    Like many other countries around the world Bangladesh's SMEs play strong role in employment generation as well as ensuring country's economic development. Although SMEs have the potentials, at the rapidly increasing age of internet, to utilize the newly emerged technology dependent communication and transaction medium, e-commerce, in acquiring their competitiveness,...

    Provided By University of Asia and the Pacific

  • White Papers // Feb 2011

    Modified Approach of RFCOMM Implementation to Protect Bluetooth Technology from Bluebug Attack

    Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, Personal Digital Assistants (PDAs), cameras, and printers, etc. This paper provides an overview of Bluetooth technology, protocol stack, some of the vulnerabilities, risks and also...

    Provided By University of Asia and the Pacific

  • White Papers // Jun 2012

    Private Two-Party Set Intersection Protocol in Rational Model

    Many data mining algorithms use privacy preserving set intersection operations. Private set operations have considered semi-honest and malicious adversarial models in cryptographic settings. Protocols in semi-honest model, requiring light computations, provide weak security. Protocols in malicious model guarantee strong security at the price of expensive computations like homomorphic encryption and...

    Provided By University of Asia and the Pacific

  • White Papers // Feb 2011

    Modified Approach of RFCOMM Implementation to Protect Bluetooth Technology from Bluebug Attack

    Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, Personal Digital Assistants (PDAs), cameras, and printers, etc. This paper provides an overview of Bluetooth technology, protocol stack, some of the vulnerabilities, risks and also...

    Provided By University of Asia and the Pacific

  • White Papers // May 2013

    Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security

    For searching keywords against encrypted data, the Public key Encryption scheme with Keyword Search (PEKS), and it's an extension called Secure-Channel Free PEKS (SCF-PEKS) have been proposed. In SCF-PEKS, a receiver makes a trapdoor for a keyword, and uploads it on a server. A sender computes an encrypted keyword, and...

    Provided By University of Asia and the Pacific

  • White Papers // May 2012

    Adoption of B2B e-Commerce by the SMEs in Bangladesh

    Like many other countries around the world Bangladesh's SMEs play strong role in employment generation as well as ensuring country's economic development. Although SMEs have the potentials, at the rapidly increasing age of internet, to utilize the newly emerged technology dependent communication and transaction medium, e-commerce, in acquiring their competitiveness,...

    Provided By University of Asia and the Pacific