SECRET SEARCH

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Error Correction of Secret Images by Search Order Coding

In this paper, an image recovery method based on search-order coding (SOC) is proposed. By using SOC, a SOC-image of the secret image can be generated. If the secret image is damaged, people can still obtain a version of the secret image that looks not bad by referring to the SOC-image. Also, the information of the secret image cannot be retrieved from the SOC-image alone. Key-Words: search-ord...

متن کامل

Secret Sharing

This document provides the basic concept of Secret Sharing technique in practice. Main overview of some current secret sharing schemes are discussed according to the papers, provided during the course. Future scope and possibilities of secret sharing schemes are also introduced.

متن کامل

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing

We present a new improvement in the Linear Programming technique to derive bounds on information theoretic problems. In our case, we deal with the search for lower bounds on the information ratio of secret sharing schemes. We obtain non-Shannon-type bounds without using information inequalities explicitly. Our new techniques makes it possible to determine the optimal information ratio of linear...

متن کامل

Generating Secret Key for Multi-keyword Ranked Search over Encrypted Cloud Data

The Cloud Computing, it provide more security for the data owners and clients. As increasing popularity of cloud computing, more and more data owners are motivated to their data to cloud servers for great convenience and reduced cost in data management. So, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keywordbased document...

متن کامل

Authentication and secret search mechanisms for RFID-aware wireless sensor networks

This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture (ARIES) consisting of RFIDs and wireless sensor nodes, a mutual authentication protocol (AMULET), and a Secret Search Protocol (SSP). ARIES utilises RFID-aware sensor nodes to alleviate distance limitation problem in R...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Economic Review

سال: 2020

ISSN: 0020-6598,1468-2354

DOI: 10.1111/iere.12415