The method developed by Fujitsu Labs allows you to search 16,000 characters per second encrypted data. It could be used to perform sequential DNA analysis. As if spying on a large scale the U.S. National Security Agency (NSA) was not sufficient to generate enough concern for the protection of privacy, now Fujitsu laboratories that they had put developed a rapid incognito to perform searches in encrypted data method. The technology uses a homomorphic encryption mode said, which allows you to process encrypted data without having to decrypt. The research method developed by Fujitsu can handle lots of data at the speed of 16,000 characters per second. Above all, the search can be any sequence of characters without the support of key words as in one of the labs of Alcatel Lucent. Japanese Labs intends to market its technology in 2015 and sell it as an analytical tool. Fujitsu have no doubt that it will find use in a world where there is more data to process. But if one believes Labs resea
http://www.bnxit.com/fujitsu-labs-invented-method-searching-encrypted-data/
Subscribe to:
Post Comments (Atom)
Archives
-
▼
2014
(50)
-
▼
January
(41)
- Microsoft might be forced (again) to change the na...
- Microsoft facilitates the management of accounts O...
- EverNote: Sync 4 times faster after upgrading its ...
- Mobile applications, the other target of the NSA
- Information Builders launches Skybox for BI projec...
- Oracle Big Data: tangible business value
- Cisco annual security report unprecedented from ad...
- Apple quarterly, 2014: Record sales but concern ab...
- Native Windows malware tries to infect Android dev...
- ESET obtained the first position of AV-Comparative...
- Thomson is going to demonstrate the virtues of the...
- What is expected from Windows 8.1 Update 1?
- How to detect if Google has penalized us?
- Personal data: in the cloud and in the land
- Chrome goes to war against noisy tabs
- Case Target: 11 GB of data sent to a Russian server
- Fujitsu Labs invented a method for searching encry...
- China reactive the creation of a national OS calle...
- More updates for XP, except for anti-virus
- Using WiFi, Fortinet offers to track customers in ...
- The creator of BitTorrent developing a steganograp...
- Blackphone the smartphone ultra-secure Silent Circ...
- Dell relies on a security offering end to end
- NSA hacks radio waves unconnected PC
- Do Green Data Centers Exist?
- Data Center Management Through Careful Environment...
- Data Center Consolidation - What You Should Know
- How to Take Data Center Secure Backup
- Cisco Data Center Security: Taking the Next Step i...
- What Are The Technology Trends For 2014?
- Unlocking Encryption - A Method of Data Security
- Cisco - How to configure an IKEv2 Site to Site IPS...
- ASA - VPN Traffic is not being encrypted (CSCsd48512)
- Zone Based Firewall ZBFW
- Designing VPC and Routing
- Cisco Flex Link
- Understanding Cisco Nexus 2000 Series Fabric Exten...
- Distributed Firewall
- Distributed Firewall - Statefull ??
- Virtual Firewall
- Physical Firewall
-
▼
January
(41)
© Copyright 2014 - Security Data Center. Simple theme. Powered by Blogger.
No comments:
Post a Comment