Results 51 to 60 of about 377,078 (197)

Searchable encryption algorithm in computer big data processing application

open access: yesAutomatika, 2023
With the continuous development of computer technology, the amount of data has increased sharply, which has promoted more and more diversified data transportation and processing methods. At the same time, computer data analysis technology can effectively
Lu Ming
doaj   +1 more source

Using secret sharing for searching in encrypted data [PDF]

open access: yes, 2004
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir   +3 more
core   +7 more sources

Designated server-aided revocable identity-based keyword search on lattice

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo   +4 more
doaj   +1 more source

Multi-owner accredited keyword search over encrypted data

open access: yesTongxin xuebao, 2017
A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic
Qi-ying WU   +4 more
doaj   +2 more sources

BC-RFMS: blockchain-based rankable fuzzy multi-keyword search scheme [PDF]

open access: yesBlockchain
The cloud provides convenient storage services for the vast amount of data generated by the Internet of Things (IoT), yet it also introduces security challenges such as data tampering and privacy breaches to IoT.
Lixiang Zheng   +5 more
doaj   +1 more source

Efficient multi-keyword similarity search over encrypted cloud documents

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2021
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing.
Ayad I. Abdulsada   +2 more
openaire   +2 more sources

B+-Tree Based Multi-Keyword Ranked Similarity Search Scheme Over Encrypted Cloud Data

open access: yesIEEE Access, 2021
With the sustained evolution and expeditious popularization of cloud computing, an ever-increasing number of individuals and enterprises are encouraged to outsource data to cloud servers for reducing management overhead and ease of access.
Huanglin Shen   +4 more
doaj   +1 more source

Multi-Keyword Multi-Click Option Contracts for Sponsored Search Advertising [PDF]

open access: yes, 2013
In sponsored search, advertising slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords.
Chen, B, Cox, I, Kankanhalli, M, Wang, J
core  

Mining protein database using machine learning techniques

open access: yes, 2008
With a large amount of information relating to proteins accumulating in databases widely available online, it is of interest to apply machine learning techniques that, by extracting underlying statistical regularities in the data, make predictions about ...
Camargo, Renata, Niranjan, Mahesan
core   +1 more source

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Home - About - Disclaimer - Privacy