Split master: secure file sharing application based on shamir secret sharing scheme (Record no. 5030)

MARC details
000 -LEADER
fixed length control field 01816nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220107122810.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160328b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Transcribing agency
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Krishna Kumar V (93613016)
9 (RLIN) 8698
245 ## - TITLE STATEMENT
Title Split master: secure file sharing application based on shamir secret sharing scheme
502 ## - DISSERTATION NOTE
Degree type Master of Science in Computer Science and Information security
Name of granting institution 2013-2015
Year degree granted EXT
-- Tony Thomas
-- Jacob Nina (Director)
Miscellaneous information "Kottackal Business Solutions Pvt Ltd."
520 ## - SUMMARY, ETC.
Summary, etc. Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme (SSS) that lets you split your secret into several parts and distribute them among selected parties. Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number, of possibly different types, of shares is combined together. This project is based on Shamir secret sharing cryptographic method. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION SYSTEMS
9 (RLIN) 8699
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element SECURITY AND PRIVACY
9 (RLIN) 8700
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element NETWORK SECURITY
9 (RLIN) 8701
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     IIITM-K Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre 28/03/2016   R-715 28/03/2016 28/03/2016 Project Reports