Results 61 to 70 of about 377,078 (197)

Multi-user Fuzzy Retrieval Encryption Scheme Under Cloud Environment [PDF]

open access: yesJisuanji gongcheng, 2016
Most existing public encryption schemes with keyword search are only suitable for the single user setting and do not allow users to launch a fuzzy retrieval.In order to solve this problem, an encryption scheme which can meet the demand of multiple users ...
WU Daini,WANG Xiaoming
doaj   +1 more source

Data-driven Job Search Engine Using Skills and Company Attribute Filters

open access: yes, 2017
According to a report online, more than 200 million unique users search for jobs online every month. This incredibly large and fast growing demand has enticed software giants such as Google and Facebook to enter this space, which was previously dominated
Gao, Hua   +5 more
core   +1 more source

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain

open access: yesIEEE Access, 2020
As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal any information about original data files.
Xiaodong Yang   +4 more
doaj   +1 more source

Using semantic indexing to improve searching performance in web archives [PDF]

open access: yes, 2013
The sheer volume of electronic documents being published on the Web can be overwhelming for users if the searching aspect is not properly addressed. This problem is particularly acute inside archives and repositories containing large collections of web ...
Khan, Arshad   +2 more
core  

Keyword Search on RDF Graphs - A Query Graph Assembly Approach

open access: yes, 2017
Keyword search provides ordinary users an easy-to-use interface for querying RDF data. Given the input keywords, in this paper, we study how to assemble a query graph that is to represent user's query intention accurately and efficiently.
Han, Shuo   +3 more
core   +1 more source

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

open access: yesCommunications on Applied Electronics, 2016
To get more flexibility, data owner interested to outsource their complex data set on the cloud. Cloud computing provides data outsourcing and data high quality service. For data security, the data owner provides encryption on their data. Hence, for Low cost and low computational overhead the data owner migrates their data on the cloud.
Arti Mohanpurkar, Pradnya H.
openaire   +1 more source

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

open access: yesIEEE Transactions on Dependable and Secure Computing, 2018
Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced ...
Z. Wan, R. Deng
semanticscholar   +1 more source

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage

open access: yesIEEE Access, 2019
In a data sharing system, it is a basic requirement for a user, who has an appropriate privilege to perform keyword retrieval for encrypted documents stored in the cloud.
Jin Sun   +3 more
doaj   +1 more source

Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment

open access: yesIEEE Access, 2019
In traditional cloud computing system, searchable encryption is deemed as a core technology to realize data confidentiality protection and information retrieval functions.
Yang Yang   +5 more
doaj   +1 more source

Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

open access: yesApplied Sciences
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy