Results 31 to 40 of about 1,939 (202)
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li +3 more
doaj +1 more source
Estimating 6D Aircraft Pose from Keypoints and Structures
This article addresses the challenge of 6D aircraft pose estimation from a single RGB image during the flight. Many recent works have shown that keypoints-based approaches, which first detect keypoints and then estimate the 6D pose, achieve remarkable ...
Runze Fan, Ting-Bing Xu, Zhenzhong Wei
doaj +1 more source
New Attempt at Preparation of Fluorine-containing Poly(ether ketone)s in Supercritical Carbon Dioxide [PDF]
Fluorine-containing poly(ether ketone)s was synthesized by the nucleophilic aromatic substitution reaction of 2,2-bis(4-hydroxyphenyl)-1,1,1,3,3,3-hexafluoropropane and 4,4'-bis(2,3,4,5,6-pentafluorobenzoyl) diphenyl ether in super-critical CO(2 ...
Cassidy, Patrick E. +4 more
core +1 more source
DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data [PDF]
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage.
Geeta Mara, . +5 more
core +1 more source
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension ...
Buzhen He, Tao Feng
doaj +1 more source
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj +1 more source
A lightweight secure retrieval model applied to intranet
In universities or enterprises that need to establish an intranet to ensure local data security and privacy, intranet users can store their data on the intranet storage server to realize data backup, data confidentiality, dynamic storage space and other ...
Qiang Zhi +4 more
doaj +1 more source
An English-language adaptation and validation of the Political Efficacy Short Scale (PESS)
The Political Efficacy Short Scale (PESS) is the English-language adaptation of the German-language Political Efficacy Kurzskala (PEKS); it measures perceived political efficacy with four items.
Katharina Groskurth +3 more
doaj +1 more source

