Results 31 to 40 of about 3,665 (174)
Application of keyword searchable encryption in cloud
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj +2 more sources
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand +4 more
core +1 more source
Extraction of Keyphrases from Text: Evaluation of Four Algorithms [PDF]
This report presents an empirical evaluation of four algorithms for automatically extracting keywords and keyphrases from documents. The four algorithms are compared using five different collections of documents.
Turney, Peter
core +2 more sources
A Novel Methodology to Mitigate Keyword Guessing Attack using Keyword and Signature Hash
The importance of electronic data and its rapid growth leads to gradual increase to the data usage over the network servers and on the other side high priority is needed for the data security and privacy. The existing keyword search schemes for data retrieval from the centralized storage uses keyword as a valid parameter.
A. Gangaa +2 more
openaire +1 more source
Learning to Extract Keyphrases from Text [PDF]
Many academic journals ask their authors to provide a list of about five to fifteen key words, to appear on the first page of each article. Since these key words are often phrases of two or more words, we prefer to call them keyphrases.
Turney, Peter
core +3 more sources
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj +1 more source
Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core +2 more sources
A Function Private Attribute-Based Encryption
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj +1 more source
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu +3 more
doaj +1 more source
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone +3 more
wiley +1 more source

