نتایج جستجو برای: private key search
تعداد نتایج: 913761 فیلتر نتایج به سال:
cooperation of all health sectors and early diagnosis of the disease are the key factors for controlling tuberculosis. this study assesses the patterns of reported tuberculosis cases in iran.this was a cross sectional study. tuberculosis cases were defined according to world health organization and iran's national tb guidelines. final data were prepared for analysis using spss16 software.public...
Our contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering. Private stream searching uses an encrypted filter to conceal search terms, processes a search without decrypting the filter, and saves encrypted results to an output buffer. Our ...
Boneh, Raghunathan, and Segev (CRYPTO ’13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. W...
In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir‟s (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into „n‟ parts and distributed to „n‟ nodes in network. So when user want...
class HashTable < private TableEntry[] tableEntry; private int capacity; >@? Konstruktor ? > HashTable (int capacity) < this.capacity = capacity; tableEntry = new TableEntry [capacity]; for (int i = 0; i <= capacity-1; i++) tableEntry[i] = null; = >@? die Hashfunktion ?A> protected abstract int h (Object key); >@? fuege Element mit Schlüssel key und Wert value ein (falls nicht vorhanden) ?A> pu...
This study explores the concept of a Public Key Encryption Scheme (PKES) with an emphasis on enabling keyword search functionality. The aim this research is to develop cryptographic framework that allows users securely over encrypted data without revealing sensitive information. investigates various methods and techniques employed in PKES achieve efficient privacy-preserving capabilities. highl...
Factors Affecting Public-Private Sector's Support for the Elementary Schools M.H. Hassani Shalmaani, Ph.D. Factors affecting the public-private sector's support for elementary education were identified perusing related legislations, documents, and programs. To validate these factors a sample of 432 elementary school principals was given the list of factors of which 8 were confirme...
this study is intended to investigate the level of public-private cooperation in the process of agricultural development from the view point of potential investors and producers. to achieve this objective we used an adjusted jensen model as a conceptual framework for cooperation. in this process mutual responsibilities is provided to reveal different dimensions of strategic cooperation between ...
In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility to process such data remotely. More clearly, this scheme makes possible to switch the public encryption key to another one without the help of a trusted third party. I...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید