نتایج جستجو برای: secure search

تعداد نتایج: 349641  

Journal: :IEEE Access 2023

Recently, a drastic increase in medical imaging such as X-rays, Magnetic Resonance Imaging (MRI), and Computed Tomography (CT) offers essential anatomical functional details related to different body parts for monitoring, treatment planning, detection, classification. The use of Content-Based Medical Image Retrieval (CBMIR) technologies helps handle massive amounts images, also encryption can b...

Journal: :international journal of applied behavioral sciences 0
minoo pooravari ma in counseling, department of educational science&psychology, university of shahid beheshti saeed ghanbari assistant professor, department of educational science&psychology, university of shahid beheshti ali zadeh mohammadi associate professor, family research insititute, university of shahid beheshti leili panaghi associate professor, family research insititute, university of shahid beheshti elham aghdasta ma in counseling, department of educational science&psychology, university ofallameh tabataba'ei

the purpose of present research was comparing tendency to risky behaviours in secure/insecure attachment in parents (mother/father). the results showed that those showing insecure attachment patterns towards the mother were significantly higher at risk to become cigarette smokers, drug persuasion, and alcohol drinkers compared to those with secure attachment patterns. those showing insecure att...

2015
Rajkumar Buyya Venugopal K R S S Iyengar L M Patnaik

Cloud Computing is a popular computing technique via the Internet. The data owner outsources local data to the public cloud server to reduce the cost of the data management. Sensitive data has to be encrypted to ensure privacy before outsourcing. All traditional Searchable Symmetric Encryption (SSE) schemes search only over encrypted data through keywords,hence they do not provide effective dat...

A. Bagheri, GH. Abed Hodtani

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

Dastjedrdi, Ali Akbar , Ghorbani, Omran, Hassanzadeh, Mohammad, Hassanzadeh, Reza , Parvin, Somayeh, Safaei, Zahra,

Abstract Background and Aim: Research was carried out as a survey utilizing a researcher made questionnaire. 1149 postgraduate students were selected to fill in the research questionnaire, and 837 questionnaires were sent back. Along with descriptive statistics, independent samples t test was used to examine the difference between groups and Pearson co-efficient  to measure correlations of vari...

2016
Zaid Ameen Abduljabbar Hai Jin Ayad Ibrahim Zaid Alaa Hussien Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Antonio Fernández-Caballero

Matching a particular image within extensive datasets has become increasingly pressing in many practical fields. Hence, a number of matching methods have been developed when confidential images are used in image matching between a pair of security agencies, but they are limited by either search cost or search precision. In this paper, we propose a privacy-preserving private image matching schem...

2015
Jan Henrik Ziegeldorf Jens Hiller Martin Henze Hanno Wirtz Klaus Wehrle

Secure Two-Party Computation (STC) allows two mutually untrusting parties to securely evaluate a function on their private inputs. While tremendous progress has been made towards reducing processing overheads, STC still incurs significant communication overhead that is in fact prohibitive when no high-speed network connection is available, e.g., when applications are run over a cellular network...

2012
Kaoru Kurosawa Yasuhiro Ohtaki

For searchable symmetric encryption schemes (or symmetrickey encryption with keyword search), the security against passive adversaries (i.e. privacy) has been mainly considered so far. In this paper, we first define its security against active adversaries (i.e. reliability as well as privacy). We next formulate its UC-security. We then prove that the UCsecurity against non-adaptive adversaries ...

2015
Menghao Li Liang Yang Zimu Yuan Rui Zhang Rui Xue

With the prosperity of social networking, it becomes much more convenient for a user to sign onto multiple websites with a web-based single sign-on (SSO) account of an identity provider website. According to the implementation of these SSO system, we classify their patterns into two general abstract models: independent SSO model and standard SSO model. In our research, we find both models conta...

Journal: :ITC 2014
Min-Shiang Hwang Shih-Ting Hsu Cheng-Chi Lee

The scheme that searching over the encrypted data, which is also named conjunctive keyword searchable scheme, enables one to search the encrypted data by using conjunctive keywords. The concept was first presented by Golle et al., and then Park et al. extended their scheme into a public key system. According to the existing conjunctive keyword searchable schemes and the assumption that Golle et...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید