An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over limited fields improves the scalability of the algorithms. Another form of anonymity as used in secure multiparty computation allows multiple parties on a network to together carry out a global computation that depends on data from each party while the data supposed by each party remains unknown to the other parties. The new algorithms are constructed on top of a secure sum data mining operation using Newton’s identities and Sturm’s theorem. An algorithm for distributed solution of convinced polynomials over limited fields improves the scalability of the algorithms. Markov chain representations are used to find statistics on the number of iterations required and computer algebra gives closed form results for the completion rates.
Authors and Affiliations
Morampudi Satya Harish| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, msatyaharish3@gmail.com, Dr A. Rama Murthy| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ram111_sai@yahoo.com, K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ogidi@rediffmail.com
We propose a close real-time and cost-effective semantic questions based approach, called FAST. The thought behind FAST is to investigate and abuse the semantic connection inside and among datasets by means of relati...
A Technique To Sieve Annoying Communications From Osn Client Walls
Internet safety or online social network safety is the security of people and their information when using the Internet. Social media safety means protecting your personal information and terminates the untrusted inf...
3d Modeling and Detailing of Silumin Piston With Static Analysis
Piston is the part of engine which converts heat and pressure energy liberated by fuel combustion into mechanical works. Engine piston is the most complex component among the automotives. Weight reduction has been ga...
Distributed Manipulation Through Unidentified Data Accumulated In Cloud
Cloud computing is a rising registering standard in which resources of the processing structure are given as an administration over the Internet. As ensuring as it might be, this standard also conveys quite a few peo...
Design & Simulation of 11-level Cascaded H-bridge Grid-tied Inverter for the application of Solar Panels
This paper presents, the design and simulation of 11-level Cascaded H-bridge DC-AC Grid-tied Inverter for the application of solar panels. A 200w solar panel connected to each inverter bridge. OPALRT lab was used as...