Results 41 to 50 of about 3,618 (151)
Extended Functionality in Verifiable Searchable Encryption [PDF]
. When outsourcing the storage of sensitive data to an (un-trusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality.
A Sahai +19 more
core +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fang, Liming +3 more
openaire +4 more sources
Novel Schemes for Authentication [PDF]
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci
Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm.
Tsuraya Ats Tsauri, Nurochman Nurochman
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D. +1 more
core +2 more sources
Lightweight searchable medical data sharing scheme
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate&quot ...
Xinchun YIN, Mengyu WANG, Jianting NING
doaj +2 more sources
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source

