Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Burg, S."

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Linebased end-to-display encryption for secure documents
    (2016) Burg, S.; Channakeshava, P.; Bringmann, O.
    To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents. � 2016 IEEE.
  • No Thumbnail Available
    Item
    Linebased end-to-display encryption for secure documents
    (Institute of Electrical and Electronics Engineers Inc., 2016) Burg, S.; Channakeshava, P.; Bringmann, O.
    To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents. © 2016 IEEE.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify