Secure chip based encrypted search protocol in mobile office environments

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure keyword-based Ranked Semantic Search over Encrypted Cloud Data

With the advent of cloud computing, many organizations and individuals are interested in outsourcing their complex data management to the public cloud for economic savings and ease of access. As sensitive information may have to be encrypted before outsourcing, the data utilization service based on plaintext keyword search is not suitable for the encrypted cloud data. In this paper, we propose ...

متن کامل

Secure Conjunctive Keyword Search over Encrypted Data

We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. Work in this area has largely focused on search criteria consisting of a single keyword. If the user is actually interested i...

متن کامل

A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the ...

متن کامل

Provable Secure Encrypted Key Exchange Protocol Under Standard Model

Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password. Most existing encrypted key exchange protocols either lack security proofs or rely on the Random Oracle model. Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier com...

متن کامل

Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks

In sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a typical deployment of large number of sensor nodes have posed many challenges to the design and management of sensor networks. These challenges necessitate energy-awareness at all layers of network...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Research

سال: 2016

ISSN: 2249-7277,2277-7970

DOI: 10.19101/ijacr.2016.624016