Results 31 to 40 of about 1,939 (202)

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

Estimating 6D Aircraft Pose from Keypoints and Structures

open access: yesRemote Sensing, 2021
This article addresses the challenge of 6D aircraft pose estimation from a single RGB image during the flight. Many recent works have shown that keypoints-based approaches, which first detect keypoints and then estimate the 6D pose, achieve remarkable ...
Runze Fan, Ting-Bing Xu, Zhenzhong Wei
doaj   +1 more source

New Attempt at Preparation of Fluorine-containing Poly(ether ketone)s in Supercritical Carbon Dioxide [PDF]

open access: yes, 2006
Fluorine-containing poly(ether ketone)s was synthesized by the nucleophilic aromatic substitution reaction of 2,2-bis(4-hydroxyphenyl)-1,1,1,3,3,3-hexafluoropropane and 4,4'-bis(2,3,4,5,6-pentafluorobenzoyl) diphenyl ether in super-critical CO(2 ...
Cassidy, Patrick E.   +4 more
core   +1 more source

DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data [PDF]

open access: yes, 2016
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage.
Geeta Mara, .   +5 more
core   +1 more source

Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment

open access: yesCryptography, 2023
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension ...
Buzhen He, Tao Feng
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”

open access: yesIEEE Access
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan   +3 more
doaj   +1 more source

Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance

open access: yesIEEE Access, 2019
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj   +1 more source

A lightweight secure retrieval model applied to intranet

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
In universities or enterprises that need to establish an intranet to ensure local data security and privacy, intranet users can store their data on the intranet storage server to realize data backup, data confidentiality, dynamic storage space and other ...
Qiang Zhi   +4 more
doaj   +1 more source

An English-language adaptation and validation of the Political Efficacy Short Scale (PESS)

open access: yesMeasurement Instruments for the Social Sciences, 2021
The Political Efficacy Short Scale (PESS) is the English-language adaptation of the German-language Political Efficacy Kurzskala (PEKS); it measures perceived political efficacy with four items.
Katharina Groskurth   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy