Search results for "cryptographic hash"
showing 4 items of 4 documents
Stopping injection attacks with code and structured data
2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…
L'administration conjointe du dossier patient: une responsabilité partagée entre le patient et le praticien
2011
National audience; The main problem faced by patients, health practitioners and the authorities, is namely the gathering and updating of administrative and medical data in order to accurately reconstitute a patient's medical history. Although solutions to accelerate and to ease this gathering are being implemented at the national level in several European countries, as unique health identifier in France, information still have to be validated before use. Through this article, we propose a mixed management of patients' data, split between the patient regarding administrative information and the Medical Practitioner (MP) regarding medical information. This method is based on two processes. Th…