نتایج جستجو برای: query on encrypted data

تعداد نتایج: 9286813  

Journal: :IEEE Transactions on Information Theory 2012

Journal: :I. J. Network Security 2012
Ayman Mousa Elsayed Nigm S. El-Rabaie Osama S. Faragallah

Encryption in database systems is an important topic for research, as secure and efficient algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. Clearly, there is a compromise between the degree of security provided by encryption and the efficient querying of the database, because the operations of encryption and d...

Journal: :Security and Communication Networks 2010

Journal: :Informatics in Medicine Unlocked 2022

Privacy and security issues limit the query executions over genomics datasets, notably single nucleotide polymorphisms (SNPs), raised by sensitivity of this type data. Therefore, it is important to ensure that executing queries on these datasets do not reveal sensitive information, such as identity individuals their genetic traits, a data server. In paper, we propose present novel model, call P...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده زبانهای خارجی 1391

the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1389

abstract this study aimed at investigating the impact of etymology strategy instruction on the development of vocabulary of iranian intermediate efl learners. etymology, knowledge of origin of words, roots, and affixes, has proved to be a controversial issue and a question of long debate with regard to its impact on the process of vocabulary learning. this study employed etymology strategy in ...

Journal: :Softw., Pract. Exper. 2017
Mohsen Amini Salehi Thomas Caldwell Alejandro Fernandez Emmanuel Mickiewicz Eric Rozier Saman A. Zonouz David Redberg

Lack of trust has become one of the main concerns of users who tend to utilize one or multiple Cloud providers. Trustworthy Cloud-based computing and data storage require secure and efficient solutions which allow clients to remotely store and process their data in the Cloud. User-side encryption is an established method to secure the user data on the Cloud. However, using encryption, we lose p...

2015
Sabrina De Capitani di Vimercati Sara Foresti Giovanni Livraga Pierangela Samarati

The advancements in the Information Technology and the rapid diffusion of novel computing paradigms have accelerated the trend of moving data to the cloud. Public and private organizations are more often outsourcing their data centers to the cloud for economic and/or performance reasons, thus making data confidentiality an essential requirement. A basic technique for protecting data confidentia...

2017
R. Santhi Dr. D. Yuvaraj

-With the development of the imaging devices, such as digital cameras, smartphones, and medical imaging equipments, our world has been witnessing a tremendous growth in quantity, availability, and importance of images. The needs of efficient image storage and retrieval services are reinforced by the increase of large-scale image databases among all kinds of areas. Compared with text documents, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید