Results 131 to 140 of about 10,393 (185)
Blockchain-Based Certificateless Public Key Encryption with Keyword Search
openaire +1 more source
ProteoNexus: an integrative database to characterize genetic architecture, estimate mediation effects, and construct and evaluate prediction models of the plasma proteome. [PDF]
Shao K, Luo Z, Huang P, Yang S.
europepmc +1 more source
Technical Functions of Digital Wearable Products (DWPs) in the Consumer Acceptance Model: A Systematic Review and Bibliometric Analysis with a Biomimetic Perspective. [PDF]
Yuxin L, Salih SA, Shaari N.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Certificateless public key encryption with keyword search
China Communications, 2014Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in-trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion
Peng Yanguo +3 more
openaire +1 more source
Public Key Encryption with Wildcards Keyword Search
2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2018A new searchable encryption scheme that support queries for keywords containing wildcards is proposed. The scheme reveals trivial information about keywords. In the scheme the number of charactors included in the trapdoor keywords does not have to be the same with the searched keywords.
Zhaoli Wang +4 more
openaire +1 more source
Public-Key Encryption with Registered Keyword Search
2010Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline ...
Tang, Qiang, Chen, Liqun
openaire +1 more source
Dual-Server Public-Key Authenticated Encryption with Keyword Search
IEEE Transactions on Cloud Computing, 2022In cloud storage, how to search sensitive data efficiently and securely is a challenging problem. The searchable encryption technique provides a secure storage method without loss of data confidentiality and utilization. As an important branch of searchable encryption, public-key encryption with keyword search (PEKS) is widely studied by scholars ...
Biwen Chen +3 more
openaire +1 more source

