Zobrazeno 1 - 10
of 288
pro vyhledávání: '"Database encryption"'
Autor:
Jihye Yang, Kee Sung Kim
Publikováno v:
IEEE Access, Vol 10, Pp 102009-102018 (2022)
Order-preserving encryption (OPE) produces ciphertexts that preserve the numerical order of plaintexts. Many researchers have focused on designing ideally-secure OPE schemes. This security notion, known as IND-OCPA, has been shown to be achievable by
Externí odkaz:
https://doaj.org/article/8f492b9faf204acd89edbb4a416bf105
Autor:
Jingjing Guo, Jiacong Sun
Publikováno v:
IEEE Access, Vol 8, Pp 83754-83764 (2020)
Cloud computing enables resource-constrained clients to outsource their computation-intensive data storage and computation tasks to a cloud server. Although it creates many benefits, data outsourcing causes some security challenges for clients. In th
Externí odkaz:
https://doaj.org/article/0be5952308a7455ca76d2b8cf55f0fa0
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 277-313 (2018)
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable
Externí odkaz:
https://doaj.org/article/4ceb50061e52427594dec0f338619602
Autor:
Kalibjian, Jeff
Telemetry data has great value, as setting up a framework to collect and gather it involve significant costs. Further, the data itself has product diagnostic significance and may also have strategic national security importance if the product is defe
Externí odkaz:
http://hdl.handle.net/10150/626950
http://arizona.openrepository.com/arizona/handle/10150/626950
http://arizona.openrepository.com/arizona/handle/10150/626950
Publikováno v:
Proceedings on Privacy Enhancing Technologies, 2023 (1)
Searchable Symmetric Encryption (SSE) supports efficient yet se- cure query processing over outsourced symmetrically encrypted databases without the need for decryption. A longstanding open question has been the following: can we design a fast, scala
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::adf4afac1570d740a90e4775ca80daae
https://hdl.handle.net/20.500.11850/568666
https://hdl.handle.net/20.500.11850/568666
Autor:
Kee Sung Kim
Publikováno v:
Information, Vol 11, Iss 10, p 457 (2020)
As data outsourcing services have been becoming common recently, developing skills to search over encrypted data has received a lot of attention. Order-revealing encryption (OREnc) enables performing a range of queries on encrypted data through a pub
Externí odkaz:
https://doaj.org/article/4312384308544f66bba6fe132929e8ed
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Information Assurance & Cybersecurity. :1-9
In an increasingly digital world, information security is a very recurring theme and a growing concern for companies. This involves the protection of data and confidential or non-confidential information of a company, which transit between all its se
Publikováno v:
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI). 4:50-56
One of the algorithms in cryptography that can be used for school database security is the IDEA (International Data Encryption Algorithm) algorithm. The IDEA algorithm is one of the cryptographic algorithms that has various applications in secure dat