Results 31 to 40 of about 3,665 (174)

Application of keyword searchable encryption in cloud

open access: yesTongxin xuebao, 2015
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj   +2 more sources

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

open access: yes, 2018
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand   +4 more
core   +1 more source

Extraction of Keyphrases from Text: Evaluation of Four Algorithms [PDF]

open access: yes, 1997
This report presents an empirical evaluation of four algorithms for automatically extracting keywords and keyphrases from documents. The four algorithms are compared using five different collections of documents.
Turney, Peter
core   +2 more sources

A Novel Methodology to Mitigate Keyword Guessing Attack using Keyword and Signature Hash

open access: yesIndian Journal of Science and Technology, 2015
The importance of electronic data and its rapid growth leads to gradual increase to the data usage over the network servers and on the other side high priority is needed for the data security and privacy. The existing keyword search schemes for data retrieval from the centralized storage uses keyword as a valid parameter.
A. Gangaa   +2 more
openaire   +1 more source

Learning to Extract Keyphrases from Text [PDF]

open access: yes, 1999
Many academic journals ask their authors to provide a list of about five to fifteen key words, to appear on the first page of each article. Since these key words are often phrases of two or more words, we prefer to call them keyphrases.
Turney, Peter
core   +3 more sources

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]

open access: yes, 2009
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core   +2 more sources

A Function Private Attribute-Based Encryption

open access: yesInternational Journal of Distributed Sensor Networks, 2014
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj   +1 more source

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments

open access: yesIEEE Access, 2019
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu   +3 more
doaj   +1 more source

Eye Movements, Item Modality, and Multimodal Second Language Vocabulary Learning: Processing and Outcomes

open access: yesLanguage Learning, Volume 76, Issue 2, Page 528-564, June 2026.
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy