نتایج جستجو برای: private key search

تعداد نتایج: 913761  

Journal: :CoRR 2017
Huige Li Fangguo Zhang Jiejie He Haibo Tian

At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...

Journal: :IACR Cryptology ePrint Archive 2007
Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. Skeith

Consider the following problem: Alice wishes to maintain her email using a storage-provider Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should provide for Alice the ability to collect, retrieve, search and delete emails but, at the same time, should learn neither the content of messages sent from the senders to Alice (with Bob as an intermediary), nor the search crit...

Journal: :RFC 2009
Vijay Devarapalli Kilian Weniger

The Internet Key Exchange Protocol version 2 (IKEv2) is a protocol for setting up Virtual Private Network (VPN) tunnels from a remote location to a gateway so that the VPN client can access services in the network behind the gateway. This document defines an IKEv2 extension that allows an overloaded VPN gateway or a VPN gateway that is being shut down for maintenance to redirect the VPN client ...

Background   Public-Private Partnership Is A Successful And New Way That Can Help Developing Countries To Achieve Their Goals, And Provide Healthcare Resources To Prevent Disease, Provide Effective Health Care, And Promote The Health Of Individuals And Communities.   Methods This Critical Review, The Systematic Search Method Was Used. For This Purpose, Firstly English Articles Were Searched...

Journal: :RFC 2004
Joseph D. Touch Lars Eggert Yu-Shun Wang

IPsec can secure the links of a multihop network to protect communication between trusted components, e.g., for a secure virtual network (VN), overlay, or virtual private network (VPN). Virtual links established by IPsec tunnel mode can conflict with routing and forwarding inside VNs because IP routing depends on references to interfaces and next-hop IP addresses. The IPsec tunnel mode specific...

Journal: :Computer Communications 2008
Christos Xenakis Christoforos Ntantogian Ioannis Stavrakakis

This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Telecommunication System (UMTS). The proposed scheme, which is based on IPsec, distributes the required security functionality for deploying a VPN between the involved user’s device and the mobile network limiting the co...

1998
Ohad Rodeh Ken Birman Mark Hayden Danny Dolev

We extend traditional Virtual Private Networks (VPNs) with fault-tolerance and dynamic membership properties, deening a Dynamic Virtual Private Network (DVPN). We require no new hardware and make no special assumptions about line security. An implementation exhibits low overheard, provides guarantees of authenticity and conndentiality to any IP application running over the virtual network. Our ...

2006
P Eronen

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes the MOBI...

Journal: :International Journal of Innovative Research in Computer Science & Technology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید