Results 61 to 70 of about 130,811 (179)

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage

open access: yesIEEE Access, 2019
In a data sharing system, it is a basic requirement for a user, who has an appropriate privilege to perform keyword retrieval for encrypted documents stored in the cloud.
Jin Sun   +3 more
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment

open access: yesIEEE Access, 2019
In traditional cloud computing system, searchable encryption is deemed as a core technology to realize data confidentiality protection and information retrieval functions.
Yang Yang   +5 more
doaj   +1 more source

Using semantic indexing to improve searching performance in web archives [PDF]

open access: yes, 2013
The sheer volume of electronic documents being published on the Web can be overwhelming for users if the searching aspect is not properly addressed. This problem is particularly acute inside archives and repositories containing large collections of web ...
Khan, Arshad   +2 more
core  

Revisit the Concept of PEKS: Problems and a Possible Solution [PDF]

open access: yes, 2008
Since Boneh et al. propose the concept, non-interactive\ud Public-key Encryption with Keyword Search (PEKS) has attracted lots of attention from cryptographers.
Tang, Qiang
core   +3 more sources

Max-Pooling Loss Training of Long Short-Term Memory Networks for Small-Footprint Keyword Spotting

open access: yes, 2017
We propose a max-pooling based loss function for training Long Short-Term Memory (LSTM) networks for small-footprint keyword spotting (KWS), with low CPU, memory, and latency requirements.
Fu, Gengshen   +8 more
core   +1 more source

FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data

open access: yesIEEE Access, 2020
Currently, searchable encryption has attracted considerable attention in the field of cloud computing. The existing research mainly focuses on keyword-based search schemes, most of which support the exact matching of keywords.
Guoxiu Liu   +4 more
doaj   +1 more source

Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

open access: yesApplied Sciences
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan   +3 more
doaj   +1 more source

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy