Results 101 to 110 of about 19,326 (124)
Some of the next articles are maybe not open access.
Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack
2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017With the exposure of security events in cloud storage, encrypting data before uploading has become the most favorable choice for cloud users, which makes search on encrypted data an important issue. Attribute-based encryption with keyword search (ABKS), which achieves data access control and search on encrypted data at the same time, has risen in ...
Hang Su, Zhiqiang Zhu, Lei Sun
openaire +1 more source
Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
Journal of Shanghai Jiaotong University (Science), 2014The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-hung Wang, Tai-yuan Tu
openaire +1 more source
Journal of Systems Architecture, 2021
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +1 more source
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +1 more source
2020
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openaire +1 more source
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openaire +1 more source
IEEE Transactions on Computers, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng +3 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng +3 more
openaire +2 more sources
International Conference on Advanced Cloud and Big Data
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong +5 more
semanticscholar +1 more source
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong +5 more
semanticscholar +1 more source
Transactions on Emerging Telecommunications Technologies, 2018
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao +3 more
openaire +1 more source
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao +3 more
openaire +1 more source
Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +1 more source
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +1 more source
Concurrency and Computation
Data sharing is a fundamental component that facilitates collaboration and interoperability among entities in cloud computing environments. It enables cross‐domain access, concurrent task execution, and parallel multi‐task processing. However, challenges
Qikun Zhang +5 more
semanticscholar +1 more source
Data sharing is a fundamental component that facilitates collaboration and interoperability among entities in cloud computing environments. It enables cross‐domain access, concurrent task execution, and parallel multi‐task processing. However, challenges
Qikun Zhang +5 more
semanticscholar +1 more source
Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud
IEEE Internet of Things JournalWith the rapid proliferation of Internet of Things (IoT)-enabled healthcare systems, sensitive data, such as electronic health records (EHRs) are increasingly outsourced to semi-trusted e-health clouds, raising critical concerns about privacy and ...
Xihui Lu +3 more
semanticscholar +1 more source

