Sign Up to like & get
recommendations!
0
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-017-2701-9
Abstract: Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key…
read more here.
Keywords:
constant size;
search;
ciphertext;
size ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-018-1838-z
Abstract: Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and…
read more here.
Keywords:
size ring;
ring signature;
constant size;
signature ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "Proceedings of the National Academy of Sciences of the United States of America"
DOI: 10.1073/pnas.2217904120
Abstract: We consider the distribution of fruit pigeons of the genera Ptilinopus and Ducula on the island of New Guinea. Of the 21 species, between six and eight coexist inside humid lowland forests. We conducted or…
read more here.
Keywords:
species coexistence;
coexistence wide;
size spacing;
wide constant ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2952640
Abstract: Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can…
read more here.
Keywords:
size ciphertext;
access;
constant size;
image ... See more keywords