Results 11 to 20 of about 24,577 (282)
As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal any information about original data files.
Xiaodong Yang +4 more
doaj +1 more source
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation
With the growing popularity of cloud computing in recent years, data owners (DOs) now prefer to outsource their data to cloud servers and allow the specific data users (DUs) to retrieve the data.
Yuanbo Cui +5 more
doaj +1 more source
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han +4 more
doaj +1 more source
To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi ...
Xiaodong YANG +4 more
doaj +2 more sources
We, the Publisher, have retracted the following article: Jiyue Wang, Xi Zhang, Yonggang Zhu (2022). A multi-keyword parallel ciphertext retrieval scheme based on inverted index under the robot Distributed system. EAI Endorsed Scal Inf Syst.
Jiyue Wang, Xi Zhang, Yonggang Zhu
doaj +1 more source
Multi-keyword sponsored search [PDF]
We investigate search engines' mechanism for allocating impressions generated from different search terms. This mechanism is equivalent to running an independent GSP auction for each search term only when the number of search terms is small. In practice, the number of search terms is so large that an advertiser cannot possibly communicate to the search
openaire +1 more source
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing
Edge computing is an extension of cloud computing that enables messages to be acquired and processed at low cost. Many terminal devices are being deployed in the edge network to sense and deal with the massive data.
Kai Fan +4 more
doaj +1 more source
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang +3 more
doaj +1 more source
Keyword-Enhanced Multi-Expert Framework for Hate Speech Detection
The proliferation of hate speech on the Internet is harmful to the psychological health of individuals and society. Thus, establishing and supporting the development of hate speech detection and deploying evasion techniques is a vital task.
Weiyu Zhong +4 more
doaj +1 more source

