Sign Up to like & get
recommendations!
0
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-017-2701-9
Abstract: Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key…
read more here.
Keywords:
constant size;
search;
ciphertext;
size ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "International Journal of Information Security"
DOI: 10.1007/s10207-019-00461-y
Abstract: Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an…
read more here.
Keywords:
attack;
encryption functions;
encrypted data;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2823718
Abstract: With the increasing popularity of cloud computing, a growing data owners are motivated to outsource their huge data to cloud servers in order to facilitate access and save data management cost. To protect user privacy…
read more here.
Keywords:
search;
conjunctive keyword;
keyword search;
privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2905554
Abstract: Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.…
read more here.
Keywords:
scf;
keyword;
keyword search;
scf pepcks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2973217
Abstract: Relational keyword search (R-KWS) systems provide users with a convenient means in relational database queries. There exist two main types of R-KWS: those based on Data Graphs and those based on Schema Graphs. In this…
read more here.
Keywords:
candidate networks;
candidate;
keyword search;
combined candidate ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2996940
Abstract: With the growing popularity of cloud computing in recent years, data owners (DOs) now prefer to outsource their data to cloud servers and allow the specific data users (DUs) to retrieve the data. Searchable encryption…
read more here.
Keywords:
keyword;
generation;
keyword search;
encrypted keyword ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3162854
Abstract: This paper presents the resources and benchmarks developed for keyword search (KWS) in spoken audio from six low-resource Indian languages (from two families), namely Gujarati, Hindi, Marathi, Odia, Tamil, and Telugu. The current work on…
read more here.
Keywords:
keyword search;
low resource;
resource indian;
resource ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3138136
Abstract: Cloud-assisted Industrial Internet of Things (IIoT) systems are increasingly deployed in various applications such as location-based services. Outsourcing data to cloud servers can help minimize local data storage and computation overheads, but it may introduce…
read more here.
Keywords:
spatial keyword;
keyword search;
privacy preserving;
privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2021.3069200
Abstract: Searchable encryption enables users to perform a keyword-based search over encrypted data. Most of the existing searchable encryption schemes are based on the single cloud server model, which has some limitations, such as the single…
read more here.
Keywords:
secure;
keyword;
keyword search;
cloud ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2015.2481389
Abstract: With the advent of cloud computing, more and more people tend to outsource their data to the cloud. As a fundamental data utilization, secure keyword search over encrypted cloud data has attracted the interest of…
read more here.
Keywords:
cloud server;
cloud computing;
verification;
keyword search ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2021.3093304
Abstract: Searchable Symmetric Encryption (SSE), which enables users to search over encrypted data without decryption, has gained increasing attention from both academic and industrial fields. However, existing SSE schemes either have low search efficiency or cannot…
read more here.
Keywords:
keyword;
search;
bitmap;
keyword search ... See more keywords