Results 71 to 80 of about 3,665 (174)
The Network’s Data Security Risk Analysis [PDF]
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F. +6 more
core
Telecommunication Network Security [PDF]
YesOur global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of cyber networks that facilitates accessibility to virtually all ICT and other elements of critical infrastructural facilities, with a click of a ...
Abd-Alhameed, Raed +2 more
core
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan +3 more
doaj +1 more source
A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY [PDF]
During this paper, we must have another critical property of smooth projective hash functions. We introduce two games, namely semantic-security against selected keyword attack as well as in distinguish ability against keyword guessing attack1 to capture ...
Kavitha, B., Kumar, Dr. Y.Ravi
core
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
Satoshi Obana, Kaito Uemura
openaire +1 more source
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +1 more source
ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]
Zhao F +5 more
europepmc +1 more source

