Results 71 to 80 of about 3,665 (174)

The Network’s Data Security Risk Analysis [PDF]

open access: yes
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core  

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

Telecommunication Network Security [PDF]

open access: yes, 2015
YesOur global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of cyber networks that facilitates accessibility to virtually all ICT and other elements of critical infrastructural facilities, with a click of a ...
Abd-Alhameed, Raed   +2 more
core  

Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

open access: yesApplied Sciences
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan   +3 more
doaj   +1 more source

A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY [PDF]

open access: yes, 2018
During this paper, we must have another critical property of smooth projective hash functions. We introduce two games, namely semantic-security against selected keyword attack as well as in distinguish ability against keyword guessing attack1 to capture ...
Kavitha, B., Kumar, Dr. Y.Ravi
core  

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Satoshi Obana, Kaito Uemura
openaire   +1 more source

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +1 more source

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]

open access: yesComput Commun, 2023
Zhao F   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy