Results 11 to 20 of about 27,872 (320)

Multi-keyword search over encrypted data with user revocation

open access: yesTongxin xuebao, 2017
A mu1ti-keyword search over encrypted data was proposec1 with fi1e-1eve1 access authorization and data user revocation scheme through emp1oying ciphertext-po1icy attribute-based encryption(CP-ABE).The scheme supports fi1e-1eve1 access authorization in ...
Qi-ying WU   +5 more
doaj   +3 more sources

Multi-keyword partial matching algorithm based on text fragments

open access: yesTongxin xuebao, 2010
Network content detection based on Key words in security gateway often need to reassemble the TCP packets and even the whole file, which will cause a long delay.
LIAO Wei-qi, ZOU Wei
doaj   +3 more sources

Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme [PDF]

open access: yesJisuanji gongcheng, 2020
To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi ...
CAO Suzhen, DU Xialing, WANG Youchen, LIU Xueyan
doaj   +1 more source

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain

open access: yesIEEE Access, 2020
As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal any information about original data files.
Xiaodong Yang   +4 more
doaj   +1 more source

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation

open access: yesIEEE Access, 2020
With the growing popularity of cloud computing in recent years, data owners (DOs) now prefer to outsource their data to cloud servers and allow the specific data users (DUs) to retrieve the data.
Yuanbo Cui   +5 more
doaj   +1 more source

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration

open access: yesTongxin xuebao, 2022
To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi ...
Xiaodong YANG   +4 more
doaj   +2 more sources

Multi-keyword sponsored search [PDF]

open access: yesProceedings of the 12th ACM conference on Electronic commerce, 2011
We investigate search engines' mechanism for allocating impressions generated from different search terms. This mechanism is equivalent to running an independent GSP auction for each search term only when the number of search terms is small. In practice, the number of search terms is so large that an advertiser cannot possibly communicate to the search
openaire   +1 more source

A multi-keyword parallel ciphertext retrieval scheme based on inverted index under the robot distributed system

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
We, the Publisher, have retracted the following article: Jiyue Wang, Xi Zhang, Yonggang Zhu (2022). A multi-keyword parallel ciphertext retrieval scheme based on inverted index under the robot Distributed system. EAI Endorsed Scal Inf Syst.
Jiyue Wang, Xi Zhang, Yonggang Zhu
doaj   +1 more source

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy