Results 41 to 50 of about 22,366 (192)
Application of keyword searchable encryption in cloud
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj +2 more sources
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand +4 more
core +1 more source
Split keyword fuzzy and synonym search over encrypted cloud data [PDF]
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R. +6 more
core +1 more source
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj +1 more source
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi +3 more
core +1 more source
IGSK: Index Generation on Split Keyword for search over cloud data [PDF]
Storage as a Service (Saas) of cloud computing has become an alternative option for data owners of various organizations to store their data into the cloud. Usually sensitive data is encrypted to achieve data security and then it is outsourced into cloud.
Geetaa, C.M. +5 more
core +1 more source
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search [PDF]
Zhang et al. recently proposed a lattice-based proxy-oriented identity-based encryption with keyword search (PO-IBEKS) at Information Sciences in 2019. They claimed that their scheme can resist insider keyword guessing attacks by preventing cloud server ...
Cheng-Yi Lee +3 more
core
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone +3 more
wiley +1 more source
A Function Private Attribute-Based Encryption
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj +1 more source
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu +3 more
doaj +1 more source

