نتایج جستجو برای: order preserving encryption
تعداد نتایج: 975584 فیلتر نتایج به سال:
We present ARQ, a systematic framework for creating cryptographic schemes that handle range aggregate queries (sum, minimum, median, and mode) over encrypted datasets. Our does not rely on trusted hardware or specialized primitives such as property-preserving homomorphic encryption. Instead, ARQ unifies structures from the plaintext data management community with existing structured encryption ...
Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PKI, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based en...
Asymptotic preserving (AP) schemes for multiscale kinetic and hyperbolic equations: a review Abstract. Kinetic and hyperbolic equations contain small scales (mean free path/time, Debye length, relaxation or reaction time, etc.) that lead to various different asymptotic regimes, in which the classical numerical approximations become prohibitively expensive. Asymptotic-preserving (AP) schemes are...
In recent decades, big data analysis has become the most important research topic. Hence, security offers Cloud application and monitoring to host highly sensitive support platforms. However, privacy of an emerging issue that restricts organization utilize services. The existing preserving approaches showed several drawbacks such as a lack accurate analysis, efficiency performance, completely r...
Kinetic and hyperbolic equations contain small scales (mean free path/time, Debye length, relaxation or reaction time, etc.) that lead to various different asymptotic regimes, in which the classical numerical approximations become prohibitively expensive. Asymptotic-preserving (AP) schemes are schemes that are efficient in these asymptotic regimes. The designing principle of AP schemes are to p...
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...
At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...
With the increase of centralization of resources in IT-infrastructure and the growing amount of cloud services, database management systems (DBMS) will be more and more outsourced to Infrastructure-as-a-Service (IaaS) providers. The outsourcing of entire databases, or the computation power for processing Big Data to an external provider also means that the provider has full access to the inform...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید