Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/8410
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBurg, S.
dc.contributor.authorChannakeshava, P.
dc.contributor.authorBringmann, O.
dc.date.accessioned2020-03-30T10:18:37Z-
dc.date.available2020-03-30T10:18:37Z-
dc.date.issued2016
dc.identifier.citationISBA 2016 - IEEE International Conference on Identity, Security and Behavior Analysis, 2016, Vol., , pp.-en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8410-
dc.description.abstractTo protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents. � 2016 IEEE.en_US
dc.titleLinebased end-to-display encryption for secure documentsen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.