Results 271 to 280 of about 24,577 (282)
Some of the next articles are maybe not open access.
Coverless Information Hiding Method Based on Multi-keywords
2016As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method has realized that one Chinese character can be hidden in one natural text. However, the problem of the method is that the hiding capacity is too small.
Zhili Zhou +4 more
openaire +1 more source
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
2019 Computing, Communications and IoT Applications (ComComAp), 2019Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users’ private information and the cloud is not completely trusted, users’ private data are usually encrypted before being uploaded to cloud for security purposes.
Chuxin Wu +3 more
openaire +1 more source
Generic Multi-keyword Ranked Search on Encrypted Cloud Data
2019Although searchable encryption schemes allow secure search over the encrypted data, they mostly support conventional Boolean keyword search, without capturing any relevance of the search results. This leads to a large amount of post-processing overhead to find the most matching documents and causes an unnecessary communication cost between the servers ...
Shabnam Kasra Kermanshahi +3 more
openaire +1 more source
Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data
2016To preserve data privacy and integrity, sensitive data has to be encrypted before outsourcing to the cloud server. However, this makes keyword search based on plaintext queries obsolete. Therefore, supporting efficient keyword based ranked searches over encrypted data became an open challenge.
Daudi Mashauri +5 more
openaire +1 more source
Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing
2016Searchable symmetric encryption is an efficient way to perform keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing methods can only verify the integrity of single-keyword search results, which cannot meet the requirements of ...
Fucai Zhou +4 more
openaire +1 more source
Distributed Intrusion Alert Fusion Based on Multi Keyword
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007Ming Xu, Wei Han
openaire +1 more source
Secured Multi-Keyword Search In Decentralized Environment
2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET)J. Jerin Jose +5 more
openaire +1 more source
Edge data auditing method supporting multi-keyword validation
IEEE Transactions on Mobile ComputingJun Ye, Yu Jiang
openaire +1 more source
An Efficient Multi-keyword Searchable Attribute-Based Encryption Scheme
2022XinLi Gan, Yun Song, RuoLan Duan
openaire +1 more source
Blockchain-Based Verifiable Multi-Keyword Ciphertext Retrieval Scheme
Qianhui Sun +4 moreopenaire +1 more source

