نتایج جستجو برای: secure search

تعداد نتایج: 349641  

Journal: :Computer Communications 2004
Shiuh-Pyng Shieh Fu-Yuan Lee Ya-Wen Lin

To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often incur substantial delay for analyzing network packets. The delay can be reduced with fast packet classification, which can effectively classify network traffic, and consequently accelerate the analysis of network packet...

2017
I Askoxylakis S Ioannidis S Katsikas Aggelos Kiayias Ozgur Oksuz Alexander Russell Qiang Tang Bing Wang

In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...

2015
Jinfei Liu Li Xiong

Up till now, most medical treatments are designed for average patients. However, one size doesn’t fit all, treatments that work well for some patients may not work for others. Precision medicine is an emerging approach for disease treatment and prevention that takes into account individual variability in people’s genes, environments, lifestyles, etc. A critical component for precision medicine ...

2005
Frans A. Oliehoek Nikos A. Vlassis Edwin D. de Jong

We address the problem of learning good policies in poker games. The classical game theoretic approach to this problem specifies a Nash equilibrium solution, i.e., a pair of secure mixed (randomized) policies. We describe a new approach for calculating such secure policies based on coevolution. Here, populations of pure policies for both players are simultaneously evolved by repeated comparison...

2010
Sergei Skorobogatov

This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually stores critical parts of algorithms, sensitive data and cryptographic keys. As a security measure, read-back access to the memory is not implemented leaving only authentication and verification options for integrity ch...

Journal: :PoPETs 2017
Zachary A. Kissel Jie Wang

In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement,...

2004
H. F. Chau

In search of a quantum key distribution scheme that could stand up for more drastic eavesdropping attack, I discover a prepare-and-measure scheme using N -dimensional quantum particles as information carriers where N is a prime power. Using the Shor-Preskill-type argument, I prove that this scheme is unconditional secure against all attacks allowed by the laws of quantum physics. Incidentally, ...

Journal: :I. J. Network Security 2010
Chunxiang Gu Yuefei Zhu

Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the keyword W , but learn nothing else. In this paper, we propose a new PEKS scheme based on bilinear pairings. There is no pairing operation involved in the encryption procedure and so our new PEKS scheme is more efficie...

Journal: :IACR Cryptology ePrint Archive 2016
Raphael Bost Pierre-Alain Fouque David Pointcheval

Symmetric Searchable Encryption (SSE) is a very efficient and practical way for data owners to outsource storage of a database to a server while providing privacy guarantees. Such SSE schemes enable clients to encrypt their database while still performing queries for retrieving documents matching some keyword. This functionality is interesting to secure cloud storage, and efficient schemes have...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید