نتایج جستجو برای: private key search

تعداد نتایج: 913761  

Journal: :iranian journal of public health 0
jafar hassan zadeh dept. of epidemiology, school of health and nutrition, shiraz university of medical sciences, shiraz, iran. mahshid nasehi abbas rezaianzadeh hamidreza tabatabaee abdolreza rajaeifard ebrahim ghaderi

cooperation of all health sectors and early diagnosis of the disease are the key factors for controlling tuberculosis. this study assesses the patterns of reported tuberculosis cases in iran.this was a cross sectional study. tuberculosis cases were defined according to world health organization and iran's national tb guidelines. final data were prepared for analysis using spss16 software.public...

2013
Michael Oehler Dhananjay S. Phatak Alan T. Sherman

Our contribution defines a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet filtering. Private stream searching uses an encrypted filter to conceal search terms, processes a search without decrypting the filter, and saves encrypted results to an output buffer. Our ...

Journal: :IACR Cryptology ePrint Archive 2013
Dan Boneh Ananth Raghunathan Gil Segev

Boneh, Raghunathan, and Segev (CRYPTO ’13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. W...

2013
Neha Agrawal Sourabh Singh Verma

In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir‟s (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into „n‟ parts and distributed to „n‟ nodes in network. So when user want...

1990
Thomas Ottmann Peter Widmayer

class HashTable < private TableEntry[] tableEntry; private int capacity; >@? Konstruktor ? > HashTable (int capacity) < this.capacity = capacity; tableEntry = new TableEntry [capacity]; for (int i = 0; i <= capacity-1; i++) tableEntry[i] = null; = >@? die Hashfunktion ?A> protected abstract int h (Object key); >@? fuege Element mit Schlüssel key und Wert value ein (falls nicht vorhanden) ?A> pu...

Journal: :Open Journal of Physical Science 2023

This study explores the concept of a Public Key Encryption Scheme (PKES) with an emphasis on enabling keyword search functionality. The aim this research is to develop cryptographic framework that allows users securely over encrypted data without revealing sensitive information. investigates various methods and techniques employed in PKES achieve efficient privacy-preserving capabilities. highl...

Journal: :Archives of Clinical Neuropsychology 1999

Journal: تعلیم و تربیت 2014
,

Factors Affecting Public-Private Sector's Support for the Elementary Schools M.H. Hassani Shalmaani, Ph.D. Factors affecting the public-private sector's support for elementary education were identified perusing related legislations, documents, and programs. To validate these factors a sample of 432 elementary school principals was given the list of factors of which 8 were confirme...

Journal: :اقتصاد و توسعه کشاورزی 0
مهدی خداپرست مشهدی جلال بخت آزما قاسم ایزانلو

this study is intended to investigate the level of public-private cooperation in the process of agricultural development from the view point of potential investors and producers. to achieve this objective we used an adjusted jensen model as a conceptual framework for cooperation. in this process mutual responsibilities is provided to reveal different dimensions of strategic cooperation between ...

Journal: :CoRR 2017
Reda Bellafqira Gouenou Coatrieux Dalel Bouslimi Gwénolé Quellec Michel Cozic

In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility to process such data remotely. More clearly, this scheme makes possible to switch the public encryption key to another one without the help of a trusted third party. I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید