نتایج جستجو برای: secure search

تعداد نتایج: 349641  

Journal: :IACR Cryptology ePrint Archive 2009
Jae Hong Seo Tetsutaro Kobayashi Miyako Ohkubo Koutarou Suzuki

Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...

Journal: :IEEE/ACM Transactions on Computational Biology and Bioinformatics 2019

2013
Mikel Iturbe Jordi Castellà-Roca Alexandre Viejo

Web search engines (WSEs) are valuable tools that are widely used to find specific information in the World Wide Web. Recently, they have increased search result relevance by personalizing them according to the users’ interests. Nevertheless, WSEs also pose an important privacy threat, as they profile users by storing and analyzing their previous search data. To address this privacy problem, cu...

2013
Alexander Grebhahn Martin Schäler Veit Köppen Gunter Saake

Deleting data from a database system in a forensic secure environment and in a high performant way is a complex challenge. Due to redundant copies and additional information stored about data items, it is not appropriate to delete only data items themselves. Additional challenges arise when using multidimensional index structures. This is because information of data items are used to index the ...

2018
Wenhai Sun Ruide Zhang Wenjing Lou Thomas Hou

Search over encrypted data (SE) enables a client to delegate his search task to a third-party server that hosts a collection of encrypted documents while still guaranteeing some measure of query privacy. Software-based solutions using diverse cryptographic primitives have been extensively explored, leading to a rich set of secure search indexes and algorithm designs. However, each scheme can on...

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

2014
Xingming Sun Lu Zhou Zhangjie Fu Zhihua Xia Jiangang Shu

With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...

2009

This thesis in the field of cryptography considers secure data outsourcing with keyword search capabilities. To ensure data confidentiality the data is stored in encrypted format. An efficient solution has been developed to enable conjunctive keyword search. Also, a protocol is applied to enable efficient and secure sharing of encrypted data. It is possible to efficiently enrol and revoke users...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید