Results 31 to 40 of about 967,845 (210)
Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz +3 more
core +1 more source
Study on Database Management System Security Issues
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their ...
Mohd Amin Mohd Yunus +3 more
doaj +1 more source
Application of Chaotic Neural Network for Authentication using the Database [PDF]
In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding by entering values to the artificial neural network for training as well as hide
Ammar Yaseen Abd Alazeez
doaj +1 more source
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
Provably-secure symmetric private information retrieval with quantum cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon, Wen Yu, Lim, Charles Ci Wen
core +1 more source
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
Dodrant-Homomorphic Encryption for Cloud Databases using Table Lookup [PDF]
Users of large commercial databases increasingly want to outsource their database operations to a cloud service providers, but guaranteeing the privacy of data in an outsourced database has become the major obstacle to this move.
Schwarz, Thomas
core +2 more sources
XML Security in Certificate Management - XML Certificator [PDF]
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core +1 more source
SQL Injection in LLM-Generated Queries: Systematic Analysis of Detection Gaps and Security Risks
Large language models (LLMs) are being woven into software systems at a remarkable pace. When these systems include a back-end database, LLM integration opens new attack surfaces for SQL injection (SQLi).
Eunyoung Kim, Sangkyun Lee
doaj +1 more source
QKD-based quantum private query without a failure probability
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses.
Gao, Fei +3 more
core +1 more source

