Articles with "keyword" as a keyword



Photo by lauradavidson from unsplash

Improving file locality in multi-keyword top-k search based on clustering

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-018-3145-6

Abstract: Nowadays, fast growing number of users and business are motivated to outsource their private data to public cloud servers. Taking into consideration security issues, private data should be encrypted before being outsourced to remote servers,… read more here.

Keywords: keyword; search; means clustering; file locality ... See more keywords
Photo from wikipedia

Integrity-verifiable conjunctive keyword searchable encryption in cloud storage

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0394-9

Abstract: Conjunctive searchable encryption is an efficient way to perform multi-keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing… read more here.

Keywords: keyword; search; conjunctive keyword; integrity ... See more keywords
Photo from wikipedia

Privacy-preserving spatial keyword location-to-trajectory matching

Sign Up to like & get
recommendations!
Published in 2020 at "Distributed and Parallel Databases"

DOI: 10.1007/s10619-020-07290-2

Abstract: Location-to-trajectory matching plays an important role in trajectory data management and analysis. In this paper, we propose and study a novel problem of privacy-preserving spatial keyword location-to-trajectory matching (PPSKLT Matching). Given a set O of… read more here.

Keywords: keyword; trajectory; privacy preserving; trajectory matching ... See more keywords
Photo by felix_kolthoff from unsplash

Reverse keyword-based location search on road networks

Sign Up to like & get
recommendations!
Published in 2021 at "GeoInformatica"

DOI: 10.1007/s10707-021-00440-3

Abstract: Reverse top- k keyword-based location query (RT k KL), aims to find the maximum spatial region such that the query object is contained in the result of any top- k spatial keyword query with users’… read more here.

Keywords: based location; keyword based; keyword; query ... See more keywords
Photo by brandi1 from unsplash

Confusing-Keyword Based Secure Search over Encrypted Cloud Data

Sign Up to like & get
recommendations!
Published in 2020 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-018-1195-8

Abstract: As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored… read more here.

Keywords: keyword; confusing keyword; paper; keyword based ... See more keywords
Photo from wikipedia

Efficient index-independent approaches for the collective spatial keyword queries

Sign Up to like & get
recommendations!
Published in 2021 at "Neurocomputing"

DOI: 10.1016/j.neucom.2020.06.150

Abstract: Abstract In abundant location-based service applications, it is necessary to process continuous spatial keyword queries over geo-textual data streaming. As an important spatial keyword query, the collective spatial keyword (CSK) query aims to find a… read more here.

Keywords: keyword; spatial keyword; index; keyword queries ... See more keywords
Photo by firmbee from unsplash

Digital library keyword analysis for visualization education research: Issues and recommendations

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Applied Research in Higher Education"

DOI: 10.1108/jarhe-03-2018-0047

Abstract: Purpose The purpose of this paper is to assess the efficacy of the Institute of Electrical and Electronics Engineers (IEEE) Xplore digital library search engine to return relevant materials on information visualization pedagogy literature and… read more here.

Keywords: keyword; research; search; visualization ... See more keywords
Photo by lensingmyworld from unsplash

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2904763

Abstract: Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the… read more here.

Keywords: keyword ranked; keyword; scheme; multi keyword ... See more keywords
Photo from wikipedia

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2905554

Abstract: Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.… read more here.

Keywords: scf; keyword; keyword search; scf pepcks ... See more keywords
Photo by lensingmyworld from unsplash

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2910828

Abstract: In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search interesting… read more here.

Keywords: keyword; scheme; multi keyword; attribute based ... See more keywords
Photo from wikipedia

KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2922646

Abstract: With the widespread application of the Internet of Things (IoT) technology, it is expected to become a new data management model. But IoT devices have limited resource storage and computing power, they are highly vulnerable… read more here.

Keywords: keyword; scheme; test; attribute based ... See more keywords