نتایج جستجو برای: secure search

تعداد نتایج: 349641  

2012
Ignacio Hernández-Antón

This work presents a couple of algorithmic techniques applied to the Russian Cards Problem. This problem represent an idealized scenario where Dynamic Epistemic Logic [4, 5, 8] plays an important role in secure communications analysis. This logic is in a lower layer below the protocol desing tasks acting as a specification and verification formal tool. This work focusses not on the logical aspe...

Journal: :CoRR 2016
Fuhui Zhou Zan Li Julian Cheng Qunwei Li Jiangbo Si

A multiple-input single-output cognitive radio downlink network is studied with simultaneous wireless information and power transfer. In this network, a secondary user coexists with multiple primary users and multiple energy harvesting receivers. In order to guarantee secure communication and energy harvesting, the problem of robust secure artificial noiseaided beamforming and power splitting d...

Journal: :Informatica (Slovenia) 2009
Walter Allasia Francesco Gallo Marco Milanesio Rossano Schifanella

This paper proposes a decentralized, distributed and secure communication infrastructure for indexing and retrieving multimedia contents with associated digital rights. The lack of structured metadata describing the enormous amount of multimedia contents distributed on the the web leads to simple search mechanisms that usually are limited to queries by title or by author. Our approach is based ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

2005
Hyun Sook Rhee Jin Wook Byun Dong Hoon Lee Jongin Lim

We study the problem of keyword search in which a server contains various multimedia contents and a user of server wishes to retrieve some multimedia item containing specific keywords without revealing to the server which item it is. Recently, Ogata and Kurosawa introduced an interesting keyword search scheme called oblivious keyword search by using the notion of oblivious transfer. However, on...

Journal: :I. J. Network Security 2015
Jie Wang Xiao Yu Ming Zhao

As cloud computing is increasingly expanding its application scenario, it is vital for cloud storage customers not to sacrifice the confidentiality of sensitive data while making fullest use of operational functionality of cloud secure systems. Although traditional searchable encryption can well solve exact keyword search on encrypted data with retrieving files by search interest, it does not w...

Journal: :CoRR 2014
Mehmet Kuzu Mohammad Saiful Islam Murat Kantarcioglu

Nowadays, huge amount of documents are increasingly transferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and security of the sensitive information in untrusted cloud environment is a big concern. To alleviate such concerns, encryption of sensitive data before its transfer to the cloud has become an important risk mitigation option. Encry...

2000
Anand Desai

We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing transform (AONT) with an ordinary encryption mode. The goal is to have secure encryption modes with the additional property that exhaustive key-search attacks on them are slowed down by a factor equal to the number o...

Journal: :IACR Cryptology ePrint Archive 2017
Muslum Ozgur Ozmen Thang Hoang Attila A. Yavuz

Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate keyword search and le update over an encrypted database via encrypted indexes, and therefore provides opportunities to mitigate the data privacy and utilization dilemma in cloud storage platforms. Despite its merits, recent works have shown that e cient DSSE schemes are vulnerable to statistical attacks due to the lack of forward...

Journal: :Electronics 2021

Currently, the use of biosensor-enabled mobile healthcare workflow applications in edge-cloud-enabled systems is increasing progressively. These are heavyweight and divided between a thin client device thick server edge cloud for execution. Application partitioning mechanism which based on resource energy parameters. However, existing application-partitioning schemes widely ignore security aspe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید