Results 131 to 140 of about 3,665 (174)
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". [PDF]
Wang S +5 more
europepmc +1 more source
Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. [PDF]
Wang S, Gao T, Zhang Y.
europepmc +1 more source
DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets.
Aqeel S +6 more
europepmc +1 more source
Knowledge assessment tools in atopic dermatitis patient education: a scoping review. [PDF]
Khela J, Wilken B, Asai Y.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Systems Architecture, 2021
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +3 more sources
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +3 more sources
IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +3 more sources
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +3 more sources
Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
Journal of Shanghai Jiaotong University (Science), 2014The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-hung Wang, Tai-yuan Tu
openaire +3 more sources
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications, 2009Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong +3 more
openaire +3 more sources
IEEE Transactions on Computers, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng +3 more
openaire +4 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng +3 more
openaire +4 more sources
Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +3 more sources
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +3 more sources

