Results 241 to 250 of about 2,775,007 (306)
Some of the next articles are maybe not open access.
IEEE Internet of Things Journal
Users are inclined to outsource their data to the cloud due to the rapid growth of data in response to the growing use of cloud computing and the Internet of Things (IoT). One of the primary issues for users is the secure sharing of personal data. Access
Liqing Chen +3 more
semanticscholar +1 more source
Users are inclined to outsource their data to the cloud due to the rapid growth of data in response to the growing use of cloud computing and the Internet of Things (IoT). One of the primary issues for users is the secure sharing of personal data. Access
Liqing Chen +3 more
semanticscholar +1 more source
Achieving Searchable Encryption Scheme With Search Pattern Hidden
IEEE Transactions on Services Computing, 2022Searchable Encryption (SE) enables a data owner to outsource encrypted data to an untrusted server while preserving the keyword search functionality. Typically, the server learns whether or not a query has been performed more than once, which is usually ...
Yunling Wang +4 more
semanticscholar +1 more source
Response-Hiding and Volume-Hiding Verifiable Searchable Encryption With Conjunctive Keyword Search
IEEE transactions on computersVerifiable searchable encryption (VSE) not only allows the client to search encrypted data, but also allows the client to verify whether the server honestly executes search operations.
Jiguo Li +4 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2022
Cloud storage and edge computing provide the possibility to address the tremendous storage and computing pressure caused by the explosive growth of traffic at the edge of the networks.
Jingwei Liu +6 more
semanticscholar +1 more source
Cloud storage and edge computing provide the possibility to address the tremendous storage and computing pressure caused by the explosive growth of traffic at the edge of the networks.
Jingwei Liu +6 more
semanticscholar +1 more source
A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing
IEEE Internet of Things JournalAttribute-based searchable encryption (ABSE) is a promising encryption mechanism for sharing outsourced encrypted data in clouds, allowing fine-grained access control over data while searching for encrypted data.
Kai Zhang +4 more
semanticscholar +1 more source
Verifiable Searchable Symmetric Encryption Over Additive Homomorphism
IEEE Transactions on Information Forensics and SecuritySearchable symmetric encryption (SSE) allows the client to search encrypted documents on an untrusted server without revealing the document content and queried keywords.
Licheng Ji +3 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security
Public key authenticated encryption with keyword search (PAEKS) is an advanced asymmetric searchable encryption technique secure against inside keyword guessing attacks.
Leixiao Cheng, Fei Meng
semanticscholar +1 more source
Public key authenticated encryption with keyword search (PAEKS) is an advanced asymmetric searchable encryption technique secure against inside keyword guessing attacks.
Leixiao Cheng, Fei Meng
semanticscholar +1 more source
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI
IEEE Transactions on Services ComputingSearchable encryption (SE) allows a data owner to outsource encrypted documents to an untrusted cloud server while preserving privacy and achieving secure data sharing.
Yunbo Yang +6 more
semanticscholar +1 more source
Witness-based searchable encryption
Information Sciences, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sha Ma, Yi Mu, Willy Susilo, Bo Yang
openaire +3 more sources
IEEE Transactions on Dependable and Secure Computing
Multi-source multi-client (M/M) searchable encryption has drawn increasing attention as data sharing becomes prevalent in the digital economics era. It allows data from multiple sources to be securely outsourced to third parties and queried by authorized
Lin Mei +4 more
semanticscholar +1 more source
Multi-source multi-client (M/M) searchable encryption has drawn increasing attention as data sharing becomes prevalent in the digital economics era. It allows data from multiple sources to be securely outsourced to third parties and queried by authorized
Lin Mei +4 more
semanticscholar +1 more source

