نتایج جستجو برای: encrypted database
تعداد نتایج: 273905 فیلتر نتایج به سال:
To provide some background to the paper, in the database literature, the naive solution of providing public key encryption on untrusted database servers (for example, data stored in a rented cloud server) includes encrypting every record non-deterministically in order to provide notions of privacy in the database. In other words, in order to find particular records in an encrypted database, the...
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verifica...
Abstraction machine is a theoritical model of computer hardware or software system used in automatically. Then, abstract machine are used by heterogeneous for machine for memory process, ip address etc. The user proposed by encryption and decryption of same memory location. The decryption built on same memory on one set instruction computer based on multiplication process for encryption in prog...
Information that is stored in an encrypted format is, by definition, usually not amenable to statistical analysis or machine learning methods. In this paper we present detailed analysis of coordinate and accelerated gradient descent algorithms which are capable of fitting least squares and penalised ridge regression models, using data encrypted under a fully homomorphic encryption scheme. Gradi...
Precise route planning needs huge amounts of trajectory data recorded in multimedia devices. The data, including each user’s location privacy, are stored as cipher text. ability to plan routes on an encrypted database is urgent necessity. In this paper, order a public while protecting we design hybrid random bloom filter (RBF) tree databases, named the (eRBF) tree, which supports pruning and se...
The robust coding of natural images and the effective compression of encrypted images have been studied individually in recent years. However, little work has been done in the robust coding of encrypted images. The existing results in these two individual research areas cannot be combined directly for the robust coding of encrypted images. This is because the robust coding of natural images rel...
Heimdal is an independently developed and free implementation of the Kerberos 5 protocol, unencumbered by US export restrictions. It is compatible with other implementations and is close to the MIT Kerberos 5 API. It includes versions of common applications such as telnet, ftp, rsh, su, and login. Furthermore, it has some new features not available in other implementations, such as authenticate...
Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید