Results 41 to 50 of about 130,811 (179)
BC-RFMS: blockchain-based rankable fuzzy multi-keyword search scheme [PDF]
The cloud provides convenient storage services for the vast amount of data generated by the Internet of Things (IoT), yet it also introduces security challenges such as data tampering and privacy breaches to IoT.
Lixiang Zheng +5 more
doaj +1 more source
Multi Keyword Search on Encrypted Data with Ranking
To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search
openaire +1 more source
Searchable encryption algorithm in computer big data processing application
With the continuous development of computer technology, the amount of data has increased sharply, which has promoted more and more diversified data transportation and processing methods. At the same time, computer data analysis technology can effectively
Lu Ming
doaj +1 more source
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul +5 more
core +1 more source
Multi-owner accredited keyword search over encrypted data
A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic
Qi-ying WU +4 more
doaj +2 more sources
Designated server-aided revocable identity-based keyword search on lattice
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo +4 more
doaj +1 more source
Efficient multi-keyword similarity search over encrypted cloud documents
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing.
Ayad I. Abdulsada +2 more
openaire +2 more sources
Searching a biomedical bibliographic database from the Ukraine: the Panteleimon database [PDF]
The Panteleimon database is available via the Internet and is a public access, database, capable of being searched in English, Russian and Ukrainian, covering medical, pharmaceutical, and chemical publications, published in he Ukraine and Russia from ...
Adams, C. E., Kumar, A., Wright, J.
core +1 more source
With the sustained evolution and expeditious popularization of cloud computing, an ever-increasing number of individuals and enterprises are encouraged to outsource data to cloud servers for reducing management overhead and ease of access.
Huanglin Shen +4 more
doaj +1 more source
Stochastic Budget Optimization in Internet Advertising
Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the advertisements, and each "target" has a collection of games with a potentially different set of ...
B. Edelman +21 more
core +1 more source

