نتایج جستجو برای: encrypted database

تعداد نتایج: 273905  

2016

"It ia certain that all bodies whatsoever, though they have no sense, yet they have perception; for when one body b applied to another, there is a kind of election to embrace that which i s agreeable, and to exclude or expel that which i s ingrate; and whether th,e body be alterant or altered, evermore a perception precedeth operation; for eke all bodies would be like one to another." Francia B...

2012
Sunita V. Dhavale

In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Hough Transform is used to detect the iris boundaries in the digital image of an eye. The segmented and normalized iris region is divided into 8x8 non-overlapping blocks and WHT is applied to each bl...

Journal: :Information Sciences 2021

The assessment of very low quality visual data is known to be difficult. In particular, the ability humans recognize encrypted currently impossible determine computationally. human vision research community has widely studied some particular topics, such as image or determination a visibility threshold, while others are still barely researched, specifically content recognition. To this day, the...

2012
Sunita V. Dhavale Liu Yang Yue Xue Dong Liu Ying Fei S. V. Sheela P. A. Vijaya Zhonghua Lin Bibo Lu Jing Huang Xinge You Yuan Yan

Human iris is one of the most reliable biometric because of its uniqueness, stability and noninvasive nature. Thus it has attracted the attention of biometrics based identification and verification research and development community. In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Discrete Cosine Transform (DCT) domain is proposed....

2015
Archana Bindu Sunil

License plate matching plays an important role in applications like law enforcement and road pricing where the plate is first recognized and then compared to a database of authorized vehicle plates. If an entity with a license plate wants to find a match in the license plates database which is in the possession of another entity; matching in the encrypted domain ensures that the privacy of data...

2011
Raluca Ada Popa Nickolai Zeldovich Hari Balakrishnan

CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable query-based encryption which allows CryptDB to adjust the encrypti...

Journal: :Electronics 2022

Recently, studies on secure database outsourcing have been highlighted for the cloud computing environment. A few Top-k query processing algorithms proposed in encrypted database. However, previous can support either security or efficiency. Therefore, we propose a new algorithm using homomorphic cryptosystem, which both and For security, efficient protocols based arithmetic operations. To obtai...

Journal: :I. J. Network Security 2013
XiuXia Tian Xiaoling Wang Aoying Zhou

With the popular use of service-oriented technologies, Database as a Service(DaaS) paradigm is becoming a more practical and useful model for those enterprises who can’t afford the expensive DBMS products. However, access control management by the database service provider(DSP ) in this paradigm is challenged because the DSP may be untrusted for the delegated data contents. So it is important t...

2010
Ye Zhang Man Ho Au Duncan S. Wong Qiong Huang Nikos Mamoulis David Wai-Lok Cheung Siu-Ming Yiu

Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothing about the record or the credential. The only AC-OT construction that supports policy in disjunctive form requires duplication of records in the database, each with a different conjunctio...

2002
Stanislaw Jarecki Patrick Lincoln Vitaly Shmatikov

Exponential growth in digital information gathering, storage, and processing capabilities inexorably leads to conflict between wellintentioned government or commercial datamining, and fundamental privacy interests of individuals and organizations. This paper proposes a mechanism that provides cryptographic fetters on the mining of personal data, enabling efficient mining of previously-negotiate...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید