Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2025.3615640
Abstract: The Internet of Things (IoT) deployments generate continuous streams of device logs and sensor readings that are offloaded to the cloud. Devices are resource-constrained and clouds are only partially trusted, so data are encrypted before…
read more here.
Keywords:
searchable encryption;
search;
efficient fuzzy;
polyse efficient ... See more keywords