Results 51 to 60 of about 377,078 (197)
Searchable encryption algorithm in computer big data processing application
With the continuous development of computer technology, the amount of data has increased sharply, which has promoted more and more diversified data transportation and processing methods. At the same time, computer data analysis technology can effectively
Lu Ming
doaj +1 more source
Using secret sharing for searching in encrypted data [PDF]
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server.
A. Shamir +3 more
core +7 more sources
Designated server-aided revocable identity-based keyword search on lattice
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo +4 more
doaj +1 more source
Multi-owner accredited keyword search over encrypted data
A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic
Qi-ying WU +4 more
doaj +2 more sources
BC-RFMS: blockchain-based rankable fuzzy multi-keyword search scheme [PDF]
The cloud provides convenient storage services for the vast amount of data generated by the Internet of Things (IoT), yet it also introduces security challenges such as data tampering and privacy breaches to IoT.
Lixiang Zheng +5 more
doaj +1 more source
Efficient multi-keyword similarity search over encrypted cloud documents
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing.
Ayad I. Abdulsada +2 more
openaire +2 more sources
With the sustained evolution and expeditious popularization of cloud computing, an ever-increasing number of individuals and enterprises are encouraged to outsource data to cloud servers for reducing management overhead and ease of access.
Huanglin Shen +4 more
doaj +1 more source
Multi-Keyword Multi-Click Option Contracts for Sponsored Search Advertising [PDF]
In sponsored search, advertising slots are usually sold by a search engine to an advertiser through an auction mechanism in which advertisers bid on keywords.
Chen, B, Cox, I, Kankanhalli, M, Wang, J
core
Mining protein database using machine learning techniques
With a large amount of information relating to proteins accumulating in databases widely available online, it is of interest to apply machine learning techniques that, by extracting underlying statistical regularities in the data, make predictions about ...
Camargo, Renata, Niranjan, Mahesan
core +1 more source
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source

