نتایج جستجو برای: secure search
تعداد نتایج: 349641 فیلتر نتایج به سال:
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...
Web search engines (WSEs) are valuable tools that are widely used to find specific information in the World Wide Web. Recently, they have increased search result relevance by personalizing them according to the users’ interests. Nevertheless, WSEs also pose an important privacy threat, as they profile users by storing and analyzing their previous search data. To address this privacy problem, cu...
Deleting data from a database system in a forensic secure environment and in a high performant way is a complex challenge. Due to redundant copies and additional information stored about data items, it is not appropriate to delete only data items themselves. Additional challenges arise when using multidimensional index structures. This is because information of data items are used to index the ...
Search over encrypted data (SE) enables a client to delegate his search task to a third-party server that hosts a collection of encrypted documents while still guaranteeing some measure of query privacy. Software-based solutions using diverse cryptographic primitives have been extensively explored, leading to a rich set of secure search indexes and algorithm designs. However, each scheme can on...
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...
With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...
همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...
This thesis in the field of cryptography considers secure data outsourcing with keyword search capabilities. To ensure data confidentiality the data is stored in encrypted format. An efficient solution has been developed to enable conjunctive keyword search. Also, a protocol is applied to enable efficient and secure sharing of encrypted data. It is possible to efficiently enrol and revoke users...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید