Results 231 to 240 of about 46,684 (278)
Some of the next articles are maybe not open access.

Searchable Symmetric Encryption

ACM Computing Surveys, 2017
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Poh, Geong Sen   +4 more
openaire   +2 more sources

Symmetric encryption and XML encryption patterns

Proceedings of the 16th Conference on Pattern Languages of Programs, 2009
Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire   +1 more source

Updatable Searchable Symmetric Encryption: Definitions and Constructions

Theoretical Computer Science, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiwen Wang   +4 more
openaire   +1 more source

Randomized symmetric block encryption

Proceedings of the First International Conference on Security of Internet of Things, 2012
Most of the trivial symmetric block encryption algorithms give the same cipher text for a given set of plain text and key. This property can be used for performing linear and differential cryptanalysis. Using the concept of random data generation we designed a new scheme to give different cipher texts for a given set of plain text and key (when ...
B. Dinesh Reddy   +2 more
openaire   +1 more source

Symmetric-Key Encryption

2002
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire   +1 more source

Computationally Efficient Searchable Symmetric Encryption

2010
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Liesdonk, van, P.P.   +4 more
openaire   +3 more sources

Boolean symmetric searchable encryption

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013
In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire   +1 more source

Undecryptable symmetric encryption

2011 IEEE GCC Conference and Exhibition (GCC), 2011
Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention).
openaire   +1 more source

Dynamic searchable symmetric encryption

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara   +2 more
openaire   +1 more source

Symmetric Encryption

2017
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers.
openaire   +1 more source

Home - About - Disclaimer - Privacy