Results 41 to 50 of about 130,811 (179)

BC-RFMS: blockchain-based rankable fuzzy multi-keyword search scheme [PDF]

open access: yesBlockchain
The cloud provides convenient storage services for the vast amount of data generated by the Internet of Things (IoT), yet it also introduces security challenges such as data tampering and privacy breaches to IoT.
Lixiang Zheng   +5 more
doaj   +1 more source

Multi Keyword Search on Encrypted Data with Ranking

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2021
To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search
openaire   +1 more source

Searchable encryption algorithm in computer big data processing application

open access: yesAutomatika, 2023
With the continuous development of computer technology, the amount of data has increased sharply, which has promoted more and more diversified data transportation and processing methods. At the same time, computer data analysis technology can effectively
Lu Ming
doaj   +1 more source

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

open access: yes, 2019
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul   +5 more
core   +1 more source

Multi-owner accredited keyword search over encrypted data

open access: yesTongxin xuebao, 2017
A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic
Qi-ying WU   +4 more
doaj   +2 more sources

Designated server-aided revocable identity-based keyword search on lattice

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo   +4 more
doaj   +1 more source

Efficient multi-keyword similarity search over encrypted cloud documents

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2021
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing.
Ayad I. Abdulsada   +2 more
openaire   +2 more sources

Searching a biomedical bibliographic database from the Ukraine: the Panteleimon database [PDF]

open access: yes, 2005
The Panteleimon database is available via the Internet and is a public access, database, capable of being searched in English, Russian and Ukrainian, covering medical, pharmaceutical, and chemical publications, published in he Ukraine and Russia from ...
Adams, C. E., Kumar, A., Wright, J.
core   +1 more source

B+-Tree Based Multi-Keyword Ranked Similarity Search Scheme Over Encrypted Cloud Data

open access: yesIEEE Access, 2021
With the sustained evolution and expeditious popularization of cloud computing, an ever-increasing number of individuals and enterprises are encouraged to outsource data to cloud servers for reducing management overhead and ease of access.
Huanglin Shen   +4 more
doaj   +1 more source

Stochastic Budget Optimization in Internet Advertising

open access: yes, 2013
Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the advertisements, and each "target" has a collection of games with a potentially different set of ...
B. Edelman   +21 more
core   +1 more source

Home - About - Disclaimer - Privacy