Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Abraham, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2104.02890  [pdf, other

    cs.CR

    PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database

    Authors: Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Raj Gaire, Ron Steinfeld, Shangqi Lai, Gad Abraham

    Abstract: Searchable symmetric encryption (SSE) has been used to protect the confidentiality of genomic data while providing substring search and range queries on a sequence of genomic data, but it has not been studied for protecting single nucleotide polymorphism (SNP)-phenotype data. In this article, we propose a novel model, PrivGenDB, for securely storing and efficiently conducting different queries on… ▽ More

    Submitted 30 June, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

  2. arXiv:1911.00253  [pdf, other

    cs.NI

    NFV-based IoT Security for Home Networks using MUD

    Authors: Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev

    Abstract: A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the pro… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  3. arXiv:1303.0910  [pdf

    cs.CR

    Securing Web Services Using XML Signature and XML Encryption

    Authors: RA. K. Saravanaguru, George Abraham, Krishnakumar Ventakasubramanian, Kiransinh Borasia

    Abstract: This paper is aimed to evaluate the importance of XML Signature and XML Encryption in Web Service Security. In today's business scenario, organizations are investing huge amount of resources in Web Services. Web Service Transactions are done mainly through plain-text XML formats like SOAP and WSDL, hence hacking into them is not a tedious task. XML Signature and XML Encryption ensure security to X… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: 6 pages, 8 figures, 1 table

    ACM Class: H.3.5

  4. arXiv:1303.0908  [pdf

    cs.PL

    KRAB Algorithm - A Revised Algorithm for Incremental Call Graph Generation

    Authors: Rajasekhara Babu, Krishnakumar V., George Abraham, Kiransinh Borasia

    Abstract: This paper is aimed to present the importance and implementation of an incremental call graph plugin. An algorithm is proposed for the call graph implementation which has better overall performance than the algorithm that has been proposed previously. In addition to this, the algorithm has been empirically proved to have excellent performance on recursive codes. The algorithm also readily checks f… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: 6 pages, 7 figures, 1 Table, Conference

    Journal ref: World Applied Programming, Vol (2), Issue (5), May 2012. 294-299, Special section for proceeding of International E-Conference on Information Technology and Applications (IECITA), ISSN: 2222-2510

  5. arXiv:1303.0351  [pdf

    cs.DC cs.CR

    A Review On Securing Distributed Systems Using Symmetric Key Cryptography

    Authors: Ramesh Babu, George Abraham, Kiransinh Borasia

    Abstract: This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general on… ▽ More

    Submitted 1 March, 2013; originally announced March 2013.

    Comments: 7 pages, 7 figures, 1 table, Journal

    Journal ref: International Journal of Advances in Science and Technology, Vol. 4, No.4, 2012