Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Symmetric Key Cryptography

Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
Cryptography which uses the same key to encrypt data and to decrypt the ciphertext. Symmetric key cryptography is several orders of magnitude more efficient than public key cryptography.
Published in Chapter:
Commercial Home Assistance Services
Milica Milutinovic (K.U.Leuven, Belgium), Koen Decroix (Katholieke Hogeschool Sint – Lieven, Belgium), Vincent Naessens (Katholieke Hogeschool Sint – Lieven, Belgium), and Bart De Decker (K.U.Leuven, Belgium)
DOI: 10.4018/978-1-4666-3990-4.ch008
Abstract
In this chapter, the authors describe the software architecture of a commercially run home assistance system that allows patients or elderly people to stay longer at home. Since such systems often have to handle sensitive medical information, the protection of the privacy is a major concern. In addition, legislation often restricts access to health information to qualified persons (i.e. medical personnel), who are not always available in a commercial setting. The home assistance system can offer several services, ranging from scheduling necessary tasks and following up their execution, to monitoring the patient’s health status and responding promptly to requests for help or in case of emergency situations, and all this without the need to maintain personal medical data or identifying information about patients and caregivers in the home assistance centre.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Commercial Home Assistance Services
Cryptography which uses the same key to encrypt data and to decrypt the ciphertext. Symmetric key cryptography is several orders of magnitude more efficient than public key cryptography.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptography for Information Security
Uses identical cryptography key for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Lightweight Cryptography for Cyber-Physical Systems: State of the Art
(Also known as private-key cryptography) uses the same key for encryption and decryption. This type of cryptography is typically more efficient than asymmetric key cryptography, but it is also less secure.
Full Text Chapter Download: US $37.50 Add to Cart
The Detection of SQL Injection on Blockchain-Based Database
In this, the sender and receiver use a single key for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Automated Detection of SQL Injection Attack on Blockchain-Based Database
In this the sender and receiver uses the single key for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR