Browsing by Author "Will, Mark Antony"

Now showing items 1-5 of 8

  • Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

    Will, Mark Antony; Ko, Ryan K.L.; Schlickmann, Silvino J. (IEEE, 2017)
    Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can be ...
  • Computing Mod with a Variable Lookup Table

    Will, Mark Antony; Ko, Ryan K.L. (Springer Nature Singapore Pte Ltd, 2016)
    Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some having a recommend size of 2048-bits or more. ...
  • Privacy preserving computation by fragmenting individual bits and distributing gates

    Will, Mark Antony; Ko, Ryan K.L.; Witten, Ian H. (IEEE Computer Society, 2016)
    Solutions that allow the computation of arbitrary operations over data securely in the cloud are currently impractical. The holy grail of cryptography, fully homomorphic encryption, still requires minutes to compute a ...
  • Privacy-preserving encoding for cloud computing

    Will, Mark Antony (The University of Waikato, 2019)
    Information in the cloud is under constant attack from cyber criminals as profitability increases; user privacy is also at risk with data being mined for monetary value – the new gold. A single leak could have devastating ...
  • Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking

    Ko, Ryan K.L.; Will, Mark Antony (IEEE, 2014)
    Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, ...