Results 51 to 60 of about 10,393 (185)

Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]

open access: yesJournal of Internet Services and Information Security, 2016
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti   +2 more
doaj  

Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]

open access: yes, 2012
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli   +6 more
core   +2 more sources

Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups

open access: yesIEEE Access, 2020
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts.
Chen Shen, Yang Lu, Jiguo Li
doaj   +1 more source

Server-Aided Public Key Encryption With Keyword Search

open access: yesIEEE Transactions on Information Forensics and Security, 2016
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is against the data privacy of users.
Rongmao Chen   +6 more
openaire   +2 more sources

A time-aware searchable encryption scheme for EHRs

open access: yesDigital Communications and Networks, 2019
Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission.
Yousheng Zhou   +4 more
doaj   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms

open access: yesIEEE Access, 2020
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo   +3 more
doaj   +1 more source

An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme

open access: yesIEEE Access
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method

open access: yesInformation, 2018
Public key encryption with disjunctive keyword search (PEDK) is a public key encryption scheme that allows disjunctive keyword search over encrypted data without decryption.
Yu Zhang, Yin Li, Yifan Wang
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy