Results 231 to 240 of about 10,571 (279)
Research on daily medication and drug efficacy evaluation for chronic diseases based on natural language processing (NLP). [PDF]
Jiang T +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Certificateless public key encryption with keyword search
China Communications, 2014Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in-trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion
Jiangtao Cui
exaly +2 more sources
Public Key Encryption with Wildcards Keyword Search
2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2018A new searchable encryption scheme that support queries for keywords containing wildcards is proposed. The scheme reveals trivial information about keywords. In the scheme the number of charactors included in the trapdoor keywords does not have to be the same with the searched keywords.
Zhaoli Wang +4 more
openaire +1 more source
Public-Key Encryption with Registered Keyword Search
2010Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline ...
Tang, Qiang, Chen, Liqun
openaire +1 more source
Dual-Server Public-Key Authenticated Encryption with Keyword Search
IEEE Transactions on Cloud Computing, 2022In cloud storage, how to search sensitive data efficiently and securely is a challenging problem. The searchable encryption technique provides a secure storage method without loss of data confidentiality and utilization. As an important branch of searchable encryption, public-key encryption with keyword search (PEKS) is widely studied by scholars ...
Biwen Chen +3 more
openaire +1 more source
Public Key Encryption with Authorized Keyword Search
2016Public key encryption with keyword search PEKS provides an elegant mechanism for a user to identify the specific encrypted data. PEKS protects data against disclosure while making it searchable. In this paper, we propose a new cryptographic primitive called public key encryption with authorized keyword search PEAKS.
Jiang, Peng +3 more
openaire +2 more sources
Public Key Encryption with Ranked Multi-keyword Search
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013It is necessary for the cloud server to allow multi-keyword query and provide result ranking to effectively retrieve data from the large number of encrypted data stored in the cloud storage. A related work that support privacy preserving ranked multi-keyword search over encrypted cloud data (MRSE) is not in public-key model.
Chengyu Hu, Pengtao Liu
openaire +1 more source
Decryptable Public Key Encryption with Keyword Search Schemes
International Journal of Digital Content Technology and its Applications, 2010A public key encryption with keyword search (PEKS) scheme does not allow the user to decrypt the encrypted keyword or decrypt the encrypted massage. This "no-decryption" property also limits the applicability of a PEKS scheme. Fuhr and Paillier also left an open problem on how to come up with a decryptable PEKS which security does not rely on random ...
Liming Fang - +3 more
openaire +1 more source

