Results 1 to 10 of about 15,311 (163)

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption

open access: yesIEEE Access, 2023
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon   +5 more
doaj   +2 more sources

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences, 2023
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +2 more sources

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT [PDF]

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +2 more sources

A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems [PDF]

open access: yesScientific Reports
The Internet of Vehicular Things (IoVT) is evolving rapidly, connecting vehicles, infrastructure, and other smart systems via the Internet. This connectivity enhances safety, efficiency, and data-driven services but also introduces significant security ...
Garima Singh   +3 more
doaj   +2 more sources

Predictors of fairness assessment for social media screening in employee selection [PDF]

open access: yesJournal of Entrepreneurship, Management and Innovation, 2023
PURPOSE: The purpose of this paper is to analyze the factors that determine the response of potential candidates to the screening of private (represented by Facebook) and professional (LinkedIn) social networking sites (SNS) for personnel selection ...
Alicja Balcerak   +2 more
doaj   +1 more source

Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy

open access: yesThe Computer Journal, 2022
Abstract Dynamic searchable symmetric encryption (DSSE) with forward and backward privacy makes it possible to perform search on the outsourced encrypted database efficiently while still allowing updates under acceptable leakage. Current forward and backward private DSSE (FB-DSSE) scheme proposed by Zuo et al.
Haitang Lu   +3 more
openaire   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes [PDF]

open access: yesWireless Personal Communications, 2010
In this paper, we analyze the first known provably secure Radio Frequency Identification (RFID) authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in the L-K scheme without needing to corrupt tags.
Raphael C.-W. Phan   +3 more
openaire   +1 more source

A Fast Method for Protecting Users’ Privacy in Image Hash Retrieval System

open access: yesMachines, 2022
Effective search engines based on deep neural networks (DNNs) can be used to search for many images, as is the case with the Google Images search engine. However, the illegal use of search engines can lead to serious compromises of privacy.
Liang Huang   +3 more
doaj   +1 more source

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs

open access: yesSensors, 2021
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy