Results 41 to 50 of about 22,366 (192)

Application of keyword searchable encryption in cloud

open access: yesTongxin xuebao, 2015
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj   +2 more sources

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

open access: yes, 2018
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand   +4 more
core   +1 more source

Split keyword fuzzy and synonym search over encrypted cloud data [PDF]

open access: yes, 2017
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R.   +6 more
core   +1 more source

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

IGSK: Index Generation on Split Keyword for search over cloud data [PDF]

open access: yes, 2015
Storage as a Service (Saas) of cloud computing has become an alternative option for data owners of various organizations to store their data into the cloud. Usually sensitive data is encrypted to achieve data security and then it is outsourced into cloud.
Geetaa, C.M.   +5 more
core   +1 more source

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search [PDF]

open access: yes, 2021
Zhang et al. recently proposed a lattice-based proxy-oriented identity-based encryption with keyword search (PO-IBEKS) at Information Sciences in 2019. They claimed that their scheme can resist insider keyword guessing attacks by preventing cloud server ...
Cheng-Yi Lee   +3 more
core  

Eye Movements, Item Modality, and Multimodal Second Language Vocabulary Learning: Processing and Outcomes

open access: yesLanguage Learning, EarlyView.
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone   +3 more
wiley   +1 more source

A Function Private Attribute-Based Encryption

open access: yesInternational Journal of Distributed Sensor Networks, 2014
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj   +1 more source

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments

open access: yesIEEE Access, 2019
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy