Results 41 to 50 of about 3,618 (151)

Extended Functionality in Verifiable Searchable Encryption [PDF]

open access: yes, 2015
. When outsourcing the storage of sensitive data to an (un-trusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality.
A Sahai   +19 more
core   +2 more sources

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

open access: yesInformation Sciences, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fang, Liming   +3 more
openaire   +4 more sources

Novel Schemes for Authentication [PDF]

open access: yes, 2013
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core  

Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”

open access: yesIEEE Access
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan   +3 more
doaj   +1 more source

Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2018
Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm.
Tsuraya Ats Tsauri, Nurochman Nurochman
doaj   +1 more source

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

Algorithm Diversity for Resilient Systems

open access: yes, 2019
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis   +10 more
core   +1 more source

PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]

open access: yes, 2005
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D.   +1 more
core   +2 more sources

Lightweight searchable medical data sharing scheme

open access: yesTongxin xuebao, 2022
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate&quot ...
Xinchun YIN, Mengyu WANG, Jianting NING
doaj   +2 more sources

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Home - About - Disclaimer - Privacy