نتایج جستجو برای: encrypted database
تعداد نتایج: 273905 فیلتر نتایج به سال:
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
Abstract Since studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced the cloud. Therefore, couple of k NN query processing algorithms proposed over database. However, existing are either insecure or inefficient. this paper we propose algorithm via secure two-party computation Our preserves both data ...
I read the paper by Avidan et al. (1) with great interest because the World Wide Web is a great communication tool and it is only logical that studies involving multicenter data collection would utilize it. When comparing a web-based method to a single computer data collection method (a database, for example), the biggest difference is the remote data entry and, thus, the communication aspect t...
College of Physical and Environmental Oceanography, Ocean University of China, Qingdao 266100, PR China College of Electrical and Mechanical Engineering (EME), National University of Sciences and Technology (NUST), Islamabad, Pakistan Department of mathematics, Abdul Wali Khan University Mardan, Pakistan School of Mathematical Sciences, Ocean University of China, Qingdao 266100, PR China Depart...
Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and accessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor for a keyword of her interest and uses t...
Data retrieval is the largest task in any large database, in the world’s largest data bases like cloud data retrieval is the one of the major issue. Retrieving the data and processing the query over cloud server is very difficult. Many searching technique are used for retrieving the data from cloud servers. It can be retrieved through an optimization technique. There are many data retrieval tec...
Functional encryption is a new paradigm of public-key encryption that allows a user to compute f (x) on encrypted data CT (x) with a private key SK f to finely control the revealed information. Multi-input functional encryption is an important extension of (single-input) functional encryption that allows the computation f (x1, . . . ,xn) on multiple ciphertexts CT (x1), . . . ,CT (xn) with a pr...
We consider the problem of comparing two encrypted numbers and its extension – transferring one of the two secrets, depending on the result of comparison. We show how to efficiently apply our solutions to practical settings, such as auctions with the semi-honest auctioneer, proxy selling, etc. We propose a new primitive, Conditional Encrypted Mapping, which captures common security properties o...
Multi-input functional encryption is a paradigm that allows an authorized user to compute a certain function —and nothing more— over multiple plaintexts given only their encryption. The particular case of two-input functional encryption has very exciting applications like comparing the relative order of two plaintexts from their encrypted form, making range queries over an encrypted database, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید