نتایج جستجو برای: secure search

تعداد نتایج: 349641  

Journal: :J. Inf. Sci. Eng. 2017
Yang Yang Shu-Lve Yang Fenghe Wang Jin Sun

In remote data storage system, the information privacy is the main concern of the users. Data confidentiality, keyword search and access control are important characteristics that should be supported in such system. With the advent of quantum computer, number theory related assumptions are vulnerable to quantum attack. In this context, we propose a post-quantum secure searchable encryption sche...

2015
Yongan Zhao XiaoFeng Wang Haixu Tang

Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on ...

Journal: :I. J. Network Security 2013
Shih-Ting Hsu Chou Chen Yang Min-Shiang Hwang

Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypted data with a keyword without revealing any information. The concept of a PEKS scheme was proposed by Boneh et al. in 2004 and Baek et al. who extended PEKS scheme into a secure channel free PEKS scheme (SCF-PEKS) which removes the assumption, a secure channel between users and a server. In this paper, we s...

Journal: :Inf. Sci. 2013
Liming Fang Willy Susilo Chunpeng Ge Jiandong Wang

The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a “trapdoor” (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes...

2009
Wenjun Lu Ashwin Swaminathan Avinash L. Varna Min Wu

Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia documents, are first encrypted by the content owner and then store...

Journal: :Tsinghua Science & Technology 2023

Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types data with specific security constraints. First, solve “secure transmission” problem, this paper first proposes search-transmit model for network transmission, i.e., find multi-attribute optimized that meets requirements in search phase, and then packets along transmission phase...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید