Results 11 to 20 of about 57,939 (207)

Multi-Server Multi-Keyword Searchable Encryption Scheme for Designated User [PDF]

open access: yesJisuanji gongcheng, 2021
The existing searchable encryption schemes are limited in the efficiency of ciphertext retrieval and accuracy of search results,and generally do not support the verification of data user identity.To address the problems,a multi-server multi-keyword ...
DOU Fengge, CAO Suzhen, MA Jiajia, DING Xiaohui, WANG Caifen
doaj   +1 more source

OPTIMIZING KEYWORD SEARCH FOR SEARCH ENGINES USING BLOCKCHAIN TECHNOLOGY [PDF]

open access: yesProceedings on Engineering Sciences
The traditional SEO landscape, reliant on algorithmic changes and privacy concerns, demands new solutions. This research explores the integration of blockchain technology into SEO to boost website visibility without compromising user privacy.
Bharti Aggarwal   +2 more
doaj   +1 more source

Designated server-aided revocable identity-based keyword search on lattice

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo   +4 more
doaj   +1 more source

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud

open access: yesIEEE Access, 2020
Attribute-based keyword search (ABKS), as an important type of searchable encryption, has been widely utilized for secure cloud storage. In a key-policy attribute-based temporary keyword search (KP-ABTKS) scheme, a private key is associated with an ...
Kai Zhang   +4 more
doaj   +1 more source

Hybrid keyword search auctions

open access: yesProceedings of the 18th international conference on World wide web, 2009
Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism.
Goel, Ashish, Munagala, Kamesh
openaire   +2 more sources

Top-k Keyword Search Over Graphs Based On Backward Search

open access: yesITM Web of Conferences, 2017
Keyword search is one of the most friendly and intuitive information retrieval methods. Using the keyword search to get the connected subgraph has a lot of application in the graph-based cognitive computation, and it is a basic technology.
Zeng Jia-Hui   +2 more
doaj   +1 more source

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

open access: yesIEEE Access, 2019
In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search interesting ...
Shangping Wang, Shasha Jia, Yaling Zhang
doaj   +1 more source

Keyword Search for Sign Language

open access: yesICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020
Keyword search is the search for a written query in an archive, which is often assumed to be a collection from a spoken language. Yet, the main languages of the Deaf, i.e. sign languages, are mostly neglected in this definition due to being visual languages. In this paper, we propose a keyword search (KWS) system for a sign language. In this technique,
Tamer, Nazif Can, Saraclar, Murat
openaire   +2 more sources

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

open access: yesIEEE Access, 2018
Searchable encryption can support data user to selectively retrieve the cipher documents over encrypted cloud data by keyword-based search. Most of the existing searchable encryption schemes only focus on the exact keyword search.
Xinrui Ge   +4 more
doaj   +1 more source

Attribute-based keyword search encryption for power data protection

open access: yesHigh-Confidence Computing, 2023
To protect the privacy of power data, we usually encrypt data before outsourcing it to the cloud servers. However, it is challenging to search over the encrypted data. In addition, we need to ensure that only authorized users can retrieve the power data.
Xun Zhang, Dejun Mu, Jinxiong Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy