نتایج جستجو برای: secure search
تعداد نتایج: 349641 فیلتر نتایج به سال:
Recently, a drastic increase in medical imaging such as X-rays, Magnetic Resonance Imaging (MRI), and Computed Tomography (CT) offers essential anatomical functional details related to different body parts for monitoring, treatment planning, detection, classification. The use of Content-Based Medical Image Retrieval (CBMIR) technologies helps handle massive amounts images, also encryption can b...
the purpose of present research was comparing tendency to risky behaviours in secure/insecure attachment in parents (mother/father). the results showed that those showing insecure attachment patterns towards the mother were significantly higher at risk to become cigarette smokers, drug persuasion, and alcohol drinkers compared to those with secure attachment patterns. those showing insecure att...
Cloud Computing is a popular computing technique via the Internet. The data owner outsources local data to the public cloud server to reduce the cost of the data management. Sensitive data has to be encrypted to ensure privacy before outsourcing. All traditional Searchable Symmetric Encryption (SSE) schemes search only over encrypted data through keywords,hence they do not provide effective dat...
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
Abstract Background and Aim: Research was carried out as a survey utilizing a researcher made questionnaire. 1149 postgraduate students were selected to fill in the research questionnaire, and 837 questionnaires were sent back. Along with descriptive statistics, independent samples t test was used to examine the difference between groups and Pearson co-efficient to measure correlations of vari...
Matching a particular image within extensive datasets has become increasingly pressing in many practical fields. Hence, a number of matching methods have been developed when confidential images are used in image matching between a pair of security agencies, but they are limited by either search cost or search precision. In this paper, we propose a privacy-preserving private image matching schem...
Secure Two-Party Computation (STC) allows two mutually untrusting parties to securely evaluate a function on their private inputs. While tremendous progress has been made towards reducing processing overheads, STC still incurs significant communication overhead that is in fact prohibitive when no high-speed network connection is available, e.g., when applications are run over a cellular network...
For searchable symmetric encryption schemes (or symmetrickey encryption with keyword search), the security against passive adversaries (i.e. privacy) has been mainly considered so far. In this paper, we first define its security against active adversaries (i.e. reliability as well as privacy). We next formulate its UC-security. We then prove that the UCsecurity against non-adaptive adversaries ...
With the prosperity of social networking, it becomes much more convenient for a user to sign onto multiple websites with a web-based single sign-on (SSO) account of an identity provider website. According to the implementation of these SSO system, we classify their patterns into two general abstract models: independent SSO model and standard SSO model. In our research, we find both models conta...
The scheme that searching over the encrypted data, which is also named conjunctive keyword searchable scheme, enables one to search the encrypted data by using conjunctive keywords. The concept was first presented by Golle et al., and then Park et al. extended their scheme into a public key system. According to the existing conjunctive keyword searchable schemes and the assumption that Golle et...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید