Results 51 to 60 of about 3,121 (282)
Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data.
Yen-Wu Ti +3 more
doaj +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Predicting Atomic Charges in MOFs by Topological Charge Equilibration
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi +2 more
wiley +1 more source
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients
Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting
Ze Zhu, Wanshan Xu, Junfeng Xu
doaj +1 more source
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva +13 more
core +4 more sources
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul +5 more
doaj +1 more source
DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme
Under the cloud computing environment, Searchable Symmetric Encryption (SSE) is an effective method to solve the problem of encrypted data retrieval, and helps to protect the users' privacy.
Xu Wanshan, Zhang Jianbiao, Yilin Yuan
doaj +1 more source
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon +5 more
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source

