Zobrazeno 1 - 10
of 3 209
pro vyhledávání: '"Conjunctive query"'
Publikováno v:
网络与信息安全学报, Vol 10, Pp 175-187 (2024)
Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a vari
Externí odkaz:
https://doaj.org/article/613ff93abb7140feba5d3d91ad360fcd
Publikováno v:
网络与信息安全学报, Vol 10, Iss 3, Pp 175-187 (2024)
Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a vari
Externí odkaz:
https://doaj.org/article/68e56868d30e443da1b5ddc4fdd5d664
Autor:
Pratt-Hartmann, Ian, author
Publikováno v:
Fragments of First-Order Logic, 2023, ill.
Externí odkaz:
https://doi.org/10.1093/oso/9780192867964.003.0010
Publikováno v:
Tongxin xuebao, Vol 43, Pp 123-132 (2022)
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctiv
Externí odkaz:
https://doaj.org/article/1f8fdbbf442a4a6cab5c4e8abce44381
Publikováno v:
IEEE Access, Vol 8, Pp 107510-107526 (2020)
The research of searchable symmetric encryption (SSE) has been focused on the trade-off between security, performance, and functionality. Recently proposed Hidden Cross-Tags (HXT) protocol improves the Oblivious Cross-Tags (OXT) by avoiding the leaka
Externí odkaz:
https://doaj.org/article/f17143e0ce364e2cbf99093dc69b5e0b
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 7, Pp 165862-165872 (2019)
With the explosive growth of data, it has become increasingly popular to deploy the powerful cloud to manage data. Meanwhile, as the cloud is not always fully trusted, personal and sensitive data have to be encrypted before being outsourced to the cl
Externí odkaz:
https://doaj.org/article/f8718faad6ac490bb3ff16b288874eea
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Cloud Computing. 11:1091-1102
Publikováno v:
IEEE Internet of Things Journal. 9:17098-17109
Massive physical devices are deployed in the industrial Internet of Things (IoT) to collect ambiance data while heavy storage and communication cost are imposed on these IoT devices. To overcome this constraint, cloud-assisted technologies are introd