Results 21 to 30 of about 37,626 (249)

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

open access: yesIEEE Access, 2019
Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the consideration of privacy ...
Cheng Guo   +3 more
doaj   +1 more source

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

open access: yesMATEC Web of Conferences, 2016
With the development of cloud computing, more and more data owners are motivated to outsource their data to the cloud server for great flexibility and less saving expenditure.
Nie Mengxi, Ran Peng, Yang HaoMiao
doaj   +1 more source

Diversifying Top-K Results [PDF]

open access: yes, 2012
Top-k query processing finds a list of k results that have largest scores w.r.t the user given query, with the assumption that all the k results are independent to each other.
Chang, Lijun, Qin, Lu, Yu, Jeffrey Xu
core   +1 more source

Reasoning & Querying – State of the Art [PDF]

open access: yes, 2008
Various query languages for Web and Semantic Web data, both for practical use and as an area of research in the scientific community, have emerged in recent years.
Bry, François   +2 more
core   +1 more source

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

open access: yesCommunications on Applied Electronics, 2016
To get more flexibility, data owner interested to outsource their complex data set on the cloud. Cloud computing provides data outsourcing and data high quality service. For data security, the data owner provides encryption on their data. Hence, for Low cost and low computational overhead the data owner migrates their data on the cloud.
Arti Mohanpurkar, Pradnya H.
openaire   +1 more source

Semantic-Based Multi-Keyword Ranked Search Schemes over Encrypted Cloud Data

open access: yesSecurity and Communication Networks, 2022
Traditional searchable encryption schemes construct document vectors based on the term frequency-inverse document frequency (TF-IDF) model. Such vectors are not only high-dimensional and sparse but also ignore the semantic information of the documents.
Zheng Hu   +4 more
openaire   +1 more source

Secure Rental Scheme Based on Consortium Blockchain and InterPlanetary File System [PDF]

open access: yesJisuanji gongcheng
In recent years, the housing rental market has boomed, and various rental platforms have emerged. However, existing rental platforms face serious centralization issues, where damage to the central server can easily lead to a single point of failure and ...
SUN Jin, SU Wenjuan, WANG Lu, YE Kexin
doaj   +1 more source

Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

open access: yesAdvances in Electrical and Computer Engineering, 2016
As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied.
LEE, Y., KIM, P., PARK, Y.
doaj   +1 more source

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

open access: yes, 2019
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul   +5 more
core   +1 more source

Born to trade: a genetically evolved keyword bidder for sponsored search [PDF]

open access: yes, 2010
In sponsored search auctions, advertisers choose a set of keywords based on products they wish to market. They bid for advertising slots that will be displayed on the search results page when a user submits a query containing the keywords that the ...
Bikkani, Sindhura   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy