Applied Cryptography Research Papers - Academia.edu (original) (raw)

Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life,... more

Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.