Results 181 to 190 of about 15,614,023 (261)
Some of the next articles are maybe not open access.
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments
IEEE Transactions on Information Forensics and Security, 2022Cloud-based Internet of Things (IoT) system is becoming a promising architecture in our modern society. However, cloud-based IoT system brings a number of challenges in the security aspect while improving the efficiency of data analytics.
Sha Ma, Yijian Zhong, Qiong Huang
semanticscholar +1 more source
Public key encryption with equality test for Industrial Internet of Things system in cloud computing
Transactions on Emerging Telecommunications Technologies, 2021Present day world have evolved from traditional environment to smart industries using IoT scheme which in turn forms Industrial Internet of Things (IIoT), which significantly elaborated by providing enhance integration using smart communication through ...
G. Deverajan +5 more
semanticscholar +1 more source
IEEE Systems Journal, 2022
In cloud storage, public key encryption with equality test (PKEET) is suitable for testing whether two ciphertexts generated from different public keys contain the same message without decryption. Recently, (Y. J.
Hao Lin +5 more
semanticscholar +1 more source
In cloud storage, public key encryption with equality test (PKEET) is suitable for testing whether two ciphertexts generated from different public keys contain the same message without decryption. Recently, (Y. J.
Hao Lin +5 more
semanticscholar +1 more source
Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV
IEEE transactions on intelligent transportation systems (Print), 2022With the continuous development of the Internet of Vehicles (IoV), the cloud-assisted IoV is becoming an emerging and attractive paradigm, in which a growing number of IoV users use the cloud server to store the data collected from their smart devices ...
Wenchao Li +3 more
semanticscholar +1 more source
Improved Proxy Re-encryption Scheme with Equality Test
Asia Joint Conference on Information Security, 2021A proxy re-encryption with keyword search (PRES) provides simultaneously the function of keyword search and flexible sharing of data. The concept is more efficient than the traditional data-sharing method by performing "search-download-decrypt-encrypt ...
Chih-Chen Yang +4 more
semanticscholar +1 more source
Verifiable private equality test
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012In this paper we introduce the novel notion called Verifiable Private Equality Test (VPET) and propose an efficient 2-party protocol for its implementation. VPET enables two parties to securely perform an arbitrary number of comparisons on a fixed collection of (key, value) pairs and thus it is more generic than existing techniques such as Private ...
Daniel A. Mayer, Susanne Wetzel
openaire +1 more source
Testing Equality of Means after a Preliminary test of Equality of Variances
Biometrika, 1962Abstract : IN TESTING EQUALITY OF MEANS OF TWO Normal populations, Student's t-test is not generally applicable when the variances of the two populations may be unequal and their ratio unknown. A procedure is considered whereby a preliminary test is performed to ascertain whether or not the variances may be regarded as equal.
Gurland, J., McCullough, R. S.
openaire +2 more sources
Testing Equality of Correlated Exponential Variables
IEEE Transactions on Reliability, 1984Summary: Four different procedures for testing equality of failure rates of correlated exponential random variables are presented. An example of each is given, but they are not compared in a general way.
Salvia, Anthony A. +1 more
openaire +2 more sources
Public Key Encryption with Equality Test in the Standard Model
IACR Cryptology ePrint Archive, 2020Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui.
H. Lee +4 more
semanticscholar +1 more source
Statistical test of VEP waveform equality
Documenta Ophthalmologica, 2009The aim of the study was to describe a theory and method for inferring the statistical significance of a visually evoked cortical potential (VEP) recording. The statistical evaluation is predicated on the pre-stimulus VEP as estimates of the cortical potentials expected when the stimulus does not produce an effect, a mathematical transform to convert ...
Rockefeller S L, Young, Eiji, Kimura
openaire +2 more sources

