Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
Symbol‐Level GRAND‐Assisted Detection for Polar‐Coded Spatial Modulation in MIMO Systems
This research presents an integrated polar‐coded spatial modulation (PCSM) transceiver scheme for MIMO transmission over Rayleigh fading channels. The proposed architecture employs linear spatial signal processing for antenna and symbol estimation, followed by symbol‐level guessing random additive noise decoding (symbol‐level GRAND)–assisted detection ...
Abhilasha Gautam +2 more
wiley +1 more source
EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores. [PDF]
Li Y, Chen J, Zhou F, Ji D.
europepmc +1 more source
Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma +5 more
wiley +1 more source
Blockchain-enabled data governance for privacy-preserved sharing of confidential data. [PDF]
Zhang J, Datta A.
europepmc +1 more source
Related searches:
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
IEEE Transactions on Dependable and Secure Computing, 2023We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE) where a data owner stores its encrypted documents on an untrusted remote server and wishes to selectively allow multiple users to access them by issuing keyword search queries.
Javad Ghareh Chamani +4 more
openaire +4 more sources
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost
IEEE Transactions on Information Forensics and Security, 2021Dynamic Searchable Symmetric Encryption (DSSE) enables users to search on the encrypted database stored on a semi-trusted server while keeping the search and update information under acceptable leakage. However, most existing DSSE schemes are not efficient enough in practice due to the complex structures and cryptographic primitives.
Kun He +4 more
openaire +4 more sources
Dynamic multi-client searchable symmetric encryption with support for boolean queries
Information Sciences, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Leilei Du +4 more
openaire +4 more sources
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption
IEEE Transactions on Services Computing, 2020As cloud computing becomes prevalent, more and more data owners are likely to outsource their data to a cloud server. However, to ensure privacy, the data should be encrypted before outsourcing. Symmetric searchable encryption allows users to retrieve keyword over encrypted data without decrypting the data.
Cheng Guo +5 more
openaire +3 more sources

