Results 181 to 190 of about 15,614,023 (261)
Some of the next articles are maybe not open access.

Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments

IEEE Transactions on Information Forensics and Security, 2022
Cloud-based Internet of Things (IoT) system is becoming a promising architecture in our modern society. However, cloud-based IoT system brings a number of challenges in the security aspect while improving the efficiency of data analytics.
Sha Ma, Yijian Zhong, Qiong Huang
semanticscholar   +1 more source

Public key encryption with equality test for Industrial Internet of Things system in cloud computing

Transactions on Emerging Telecommunications Technologies, 2021
Present day world have evolved from traditional environment to smart industries using IoT scheme which in turn forms Industrial Internet of Things (IIoT), which significantly elaborated by providing enhance integration using smart communication through ...
G. Deverajan   +5 more
semanticscholar   +1 more source

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage

IEEE Systems Journal, 2022
In cloud storage, public key encryption with equality test (PKEET) is suitable for testing whether two ciphertexts generated from different public keys contain the same message without decryption. Recently, (Y. J.
Hao Lin   +5 more
semanticscholar   +1 more source

Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV

IEEE transactions on intelligent transportation systems (Print), 2022
With the continuous development of the Internet of Vehicles (IoV), the cloud-assisted IoV is becoming an emerging and attractive paradigm, in which a growing number of IoV users use the cloud server to store the data collected from their smart devices ...
Wenchao Li   +3 more
semanticscholar   +1 more source

Improved Proxy Re-encryption Scheme with Equality Test

Asia Joint Conference on Information Security, 2021
A proxy re-encryption with keyword search (PRES) provides simultaneously the function of keyword search and flexible sharing of data. The concept is more efficient than the traditional data-sharing method by performing "search-download-decrypt-encrypt ...
Chih-Chen Yang   +4 more
semanticscholar   +1 more source

Verifiable private equality test

Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012
In this paper we introduce the novel notion called Verifiable Private Equality Test (VPET) and propose an efficient 2-party protocol for its implementation. VPET enables two parties to securely perform an arbitrary number of comparisons on a fixed collection of (key, value) pairs and thus it is more generic than existing techniques such as Private ...
Daniel A. Mayer, Susanne Wetzel
openaire   +1 more source

Testing Equality of Means after a Preliminary test of Equality of Variances

Biometrika, 1962
Abstract : IN TESTING EQUALITY OF MEANS OF TWO Normal populations, Student's t-test is not generally applicable when the variances of the two populations may be unequal and their ratio unknown. A procedure is considered whereby a preliminary test is performed to ascertain whether or not the variances may be regarded as equal.
Gurland, J., McCullough, R. S.
openaire   +2 more sources

Testing Equality of Correlated Exponential Variables

IEEE Transactions on Reliability, 1984
Summary: Four different procedures for testing equality of failure rates of correlated exponential random variables are presented. An example of each is given, but they are not compared in a general way.
Salvia, Anthony A.   +1 more
openaire   +2 more sources

Public Key Encryption with Equality Test in the Standard Model

IACR Cryptology ePrint Archive, 2020
Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui.
H. Lee   +4 more
semanticscholar   +1 more source

Statistical test of VEP waveform equality

Documenta Ophthalmologica, 2009
The aim of the study was to describe a theory and method for inferring the statistical significance of a visually evoked cortical potential (VEP) recording. The statistical evaluation is predicated on the pre-stimulus VEP as estimates of the cortical potentials expected when the stimulus does not produce an effect, a mathematical transform to convert ...
Rockefeller S L, Young, Eiji, Kimura
openaire   +2 more sources

Home - About - Disclaimer - Privacy