Results 81 to 90 of about 10,393 (185)

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors.
Nan Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

Multi-keyword public key searchable encryption scheme with pattern hiding

open access: yesTongxin xuebao
To address the limitations of existing multi-user searchable encryption (SE) schemes that fail to hide access patterns, search patterns, and resist keyword guessing attacks, a novel public-key searchable encryption scheme was proposed supporting multi ...
NIE Xuyun   +6 more
doaj  

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS One
Khan AN   +5 more
europepmc   +1 more source

Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Satoshi Obana, Kaito Uemura
openaire   +1 more source

Home - About - Disclaimer - Privacy