SECRET SEARCH
نویسندگان
چکیده
منابع مشابه
Error Correction of Secret Images by Search Order Coding
In this paper, an image recovery method based on search-order coding (SOC) is proposed. By using SOC, a SOC-image of the secret image can be generated. If the secret image is damaged, people can still obtain a version of the secret image that looks not bad by referring to the SOC-image. Also, the information of the secret image cannot be retrieved from the SOC-image alone. Key-Words: search-ord...
متن کاملSecret Sharing
This document provides the basic concept of Secret Sharing technique in practice. Main overview of some current secret sharing schemes are discussed according to the papers, provided during the course. Future scope and possibilities of secret sharing schemes are also introduced.
متن کاملImproving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds without using information inequalities explicitly. Our new techniques makes it possible to determine the optimal information ratio of linear...
متن کاملGenerating Secret Key for Multi-keyword Ranked Search over Encrypted Cloud Data
The Cloud Computing, it provide more security for the data owners and clients. As increasing popularity of cloud computing, more and more data owners are motivated to their data to cloud servers for great convenience and reduced cost in data management. So, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keywordbased document...
متن کاملAuthentication and secret search mechanisms for RFID-aware wireless sensor networks
This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture (ARIES) consisting of RFIDs and wireless sensor nodes, a mutual authentication protocol (AMULET), and a Secret Search Protocol (SSP). ARIES utilises RFID-aware sensor nodes to alleviate distance limitation problem in R...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Economic Review
سال: 2020
ISSN: 0020-6598,1468-2354
DOI: 10.1111/iere.12415