Results 1 to 10 of about 197 (148)

Public Key Encryption with Keyword Search in Cloud: A Survey [PDF]

open access: yesEntropy, 2020
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Yunhong Zhou   +4 more
doaj   +2 more sources

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yesIEEE Access, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
K. Rajesh Rao   +4 more
doaj   +5 more sources

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]

open access: yesSensors, 2020
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang   +4 more
doaj   +2 more sources

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [PDF]

open access: yesSensors, 2019
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu   +5 more
doaj   +2 more sources

Preeclampsia knowledge among postpartum women treated for preeclampsia and eclampsia at Korle Bu Teaching Hospital in Accra, Ghana [PDF]

open access: yesBMC Pregnancy and Childbirth, 2020
Background Preeclampsia/eclampsia is a major cause of maternal morbidity and mortality worldwide, yet patients’ perspectives about their diagnosis are not well understood.
Avina Joshi   +4 more
doaj   +2 more sources

Surgical management of urinary stones with abnormal kidney anatomy [PDF]

open access: yesKaohsiung Journal of Medical Sciences, 2017
In spite of the fact that urologic surgical techniques used by urologists are becoming more and more minimally invasive and easier because of developing technologies, surgical approaches for the urinary stones in kidneys with abnormal anatomy are still ...
Giray Ergin   +5 more
doaj   +2 more sources

Protein extract of kenaf seed exhibits anticoagulant, antiplatelet and antioxidant activities

open access: yesAsian Pacific Journal of Tropical Biomedicine, 2022
Objective: To explore the anticoagulant, antiplatelet and antioxidant activities of protein extract of kenaf seed (PEKS). Methods: Sodium dodecyl sulphate polyacrylamide gel electrophoresis and reverse-phase high-performance liquid chromatography ...
Sujatha M Hanumegowda   +8 more
doaj   +1 more source

Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

open access: yesIEEE Access, 2022
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan   +3 more
doaj   +1 more source

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2022
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade   +2 more
doaj   +1 more source

A PEKS-Based NDN Strategy for Name Privacy

open access: yesFuture Internet, 2020
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy