Results 31 to 40 of about 1,471,228 (283)

Toward Forward Secure SSE Supporting Conjunctive Keyword Search

open access: yesIEEE Access, 2019
The primitive of Searchable Symmetric Encryption (SSE) allows a server to perform search directly over encrypted documents. Recently, forward secure SSE (FSSE) has attracted significant attention due to its secure property for document update.
Yunling Wang   +4 more
doaj   +1 more source

Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks

open access: yesIEEE Access, 2020
In the Vehicle-to-Grid (V2G) network, the electric vehicles (EVs) need to report their respective information, such as vehicle identity, battery capacity, battery state of charge (SoC), current location, and driving direction, to the power grid through ...
Qinglong Wang   +3 more
doaj   +1 more source

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

open access: yesIEEE Access, 2020
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen   +4 more
doaj   +1 more source

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

open access: yesSensors, 2023
5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures.
Ilsun You   +5 more
doaj   +1 more source

DSTC: DNS-based Strict TLS Configurations

open access: yes, 2018
Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g.
AJ Menezes   +3 more
core   +1 more source

Secure Streaming Data Encryption and Query Scheme with Electric Vehicle Key Management

open access: yesInformation
The rapid proliferation of Electric Vehicle (EV) infrastructures has led to the massive generation of high-frequency streaming data uploaded to cloud platforms for real-time analysis, while such data supports intelligent energy management and behavioral ...
Zhicheng Li   +5 more
doaj   +1 more source

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices

open access: yesIEEE Access, 2018
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao   +5 more
doaj   +1 more source

Port Forwarding Services Are Forwarding Security Risks

open access: yes2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P)
We conduct the first comprehensive security study on representative port forwarding services (PFS), which emerge in recent years and make the web services deployed in internal networks available on the Internet along with better usability but less complexity compared to traditional techniques (e.g., NAT traversal techniques). Our study is made possible
Wang, Haoyuan   +4 more
openaire   +2 more sources

Deduction of urban power supply risk transmission and blocking method in the context of the new power system

open access: yesZhejiang dianli, 2022
In the context of new power system construction and the increasingly severe risks of urban security, urban power supply security has now become a top priority of urban security.
ZHU Chao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy