Articles with "secure verifiable" as a keyword



Photo by hudsoncrafted from unsplash

SeVEP: Secure and Verifiable Electronic Polling System

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2897252

Abstract: Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any Internet-connected computing device anywhere in the world. However, unlike traditional paper-based… read more here.

Keywords: system; polling system; secure verifiable; security ... See more keywords
Photo by hudsoncrafted from unsplash

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2017.2776402

Abstract: Storage is one of the main services that the cloud provides users. Utilizing the cloud to store large amounts of data can alleviate the cost of storage and the hardware investment on the local side,… read more here.

Keywords: dynamic operations; database; secure verifiable; verifiable database ... See more keywords
Photo by mybbor from unsplash

A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3224666

Abstract: In a broad range of commercial and government applications, supporting secure location-based query services over outsourced cloud-based services particularly for data update on encrypted datasets remains challenging in practice. Compounding the challenge is the need… read more here.

Keywords: structure; skyline queries; location based; secure verifiable ... See more keywords
Photo from wikipedia

Secure Verifiable Scheme for Biometric System based on Secret Sharing and CSK

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Computing"

DOI: 10.47839/ijc.20.1.2095

Abstract: Biometric templates stored in a database introduce a number of security and privacy risks. The requirements for an architecture that does not suffer from these risks are needed. Therefore, the reference information that is stored… read more here.

Keywords: protection; stored database; system; template ... See more keywords