Artykuły w czasopismach na temat „Dynamic Searchable Symmetric Encryption”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Dynamic Searchable Symmetric Encryption”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Pełny tekst źródłaGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.
Pełny tekst źródłaKissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.
Pełny tekst źródłaCui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.
Pełny tekst źródłaZhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.
Pełny tekst źródłaEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Pełny tekst źródłaWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Pełny tekst źródłaBilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.
Pełny tekst źródłaZhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.
Pełny tekst źródłaHuang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.
Pełny tekst źródłaHe, Kun, Jing Chen, Qinxi Zhou, Ruiying Du, and Yang Xiang. "Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost." IEEE Transactions on Information Forensics and Security 16 (2021): 1538–49. http://dx.doi.org/10.1109/tifs.2020.3033412.
Pełny tekst źródłaHiemenz, Benedikt, and Michel Krämer. "Dynamic searchable symmetric encryption for storing geospatial data in the cloud." International Journal of Information Security 18, no. 3 (2018): 333–54. http://dx.doi.org/10.1007/s10207-018-0414-4.
Pełny tekst źródłaDu, Leilei, Kenli Li, Qin Liu, Zhiqiang Wu, and Shaobo Zhang. "Dynamic multi-client searchable symmetric encryption with support for boolean queries." Information Sciences 506 (January 2020): 234–57. http://dx.doi.org/10.1016/j.ins.2019.08.014.
Pełny tekst źródłaGuo, Cheng, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, and Bin Feng. "Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption." IEEE Transactions on Services Computing 13, no. 6 (2020): 1034–44. http://dx.doi.org/10.1109/tsc.2017.2768045.
Pełny tekst źródłaTi, Yen-Wu, Chia-Feng Wu, Chia-Mu Yu, and Sy-Yen Kuo. "Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications." IEEE Access 8 (2020): 1715–32. http://dx.doi.org/10.1109/access.2019.2961971.
Pełny tekst źródłaLi, Hongwei, Yi Yang, Yuanshun Dai, Shui Yu, and Yong Xiang. "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data." IEEE Transactions on Cloud Computing 8, no. 2 (2020): 484–94. http://dx.doi.org/10.1109/tcc.2017.2769645.
Pełny tekst źródłaLiu, Chang, Liehuang Zhu, and Jinjun Chen. "Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud." Journal of Network and Computer Applications 86 (May 2017): 3–14. http://dx.doi.org/10.1016/j.jnca.2016.09.010.
Pełny tekst źródłaSun, Lixue, Chunxiang Xu, and Yuan Zhang. "A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting." Journal of Information Security and Applications 40 (June 2018): 145–55. http://dx.doi.org/10.1016/j.jisa.2018.03.002.
Pełny tekst źródłaZhao, Minghao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, and Shaojing Li. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.094368.
Pełny tekst źródłaLi, Shaojing, Hao Wang, Qiuliang Xu, Han Jiang, Zhen Li, and Minghao Zhao. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.10015546.
Pełny tekst źródłaXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, and Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain." PeerJ Computer Science 8 (March 21, 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Pełny tekst źródłaYuan, Dandan, Cong Zuo, Shujie Cui, and Giovanni Russello. "Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 40–58. http://dx.doi.org/10.56553/popets-2023-0040.
Pełny tekst źródłaAmjad, Ghous, Seny Kamara, and Tarik Moataz. "Breach-Resistant Structured Encryption." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 245–65. http://dx.doi.org/10.2478/popets-2019-0014.
Pełny tekst źródłaPoh, Geong Sen, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, and Moesfa Soeheila Mohamad. "Searchable Symmetric Encryption." ACM Computing Surveys 50, no. 3 (2017): 1–37. http://dx.doi.org/10.1145/3064005.
Pełny tekst źródłaLi, Huige, Fangguo Zhang, and Chun-I. Fan. "Deniable Searchable Symmetric Encryption." Information Sciences 402 (September 2017): 233–43. http://dx.doi.org/10.1016/j.ins.2017.03.032.
Pełny tekst źródłaChase, Melissa, and Emily Shen. "Substring-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 263–81. http://dx.doi.org/10.1515/popets-2015-0014.
Pełny tekst źródłaLuo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Pełny tekst źródłaOGATA, Wakaha, and Kaoru KUROSAWA. "No-Dictionary Searchable Symmetric Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (2019): 114–24. http://dx.doi.org/10.1587/transfun.e102.a.114.
Pełny tekst źródłaETEMAD, Mohammad, and Alptekin KÜPÇÜ. "Verifiable dynamic searchable encryption." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 27, no. 4 (2019): 2606–23. http://dx.doi.org/10.3906/elk-1901-157.
Pełny tekst źródłaDai, Shuguang, Huige Li, and Fangguo Zhang. "Memory leakage-resilient searchable symmetric encryption." Future Generation Computer Systems 62 (September 2016): 76–84. http://dx.doi.org/10.1016/j.future.2015.11.003.
Pełny tekst źródłaLi, Huige, Haibo Tian, Fangguo Zhang, and Jiejie He. "Blockchain-based searchable symmetric encryption scheme." Computers & Electrical Engineering 73 (January 2019): 32–45. http://dx.doi.org/10.1016/j.compeleceng.2018.10.015.
Pełny tekst źródłaPoh, Geong Sen, Moesfa Soeheila Mohamad, and Ji-Jian Chin. "Searchable symmetric encryption over multiple servers." Cryptography and Communications 10, no. 1 (2017): 139–58. http://dx.doi.org/10.1007/s12095-017-0232-y.
Pełny tekst źródłaHan, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.
Pełny tekst źródłaChoi, Daeseon, Seung-Hyun Kim, and Younho Lee. "Address Permutation for Privacy-Preserving Searchable Symmetric Encryption." ETRI Journal 34, no. 1 (2012): 66–75. http://dx.doi.org/10.4218/etrij.12.0111.0243.
Pełny tekst źródłaHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Pełny tekst źródłaCurtmola, Reza, Juan Garay, Seny Kamara, and Rafail Ostrovsky. "Searchable symmetric encryption: Improved definitions and efficient constructions." Journal of Computer Security 19, no. 5 (2011): 895–934. http://dx.doi.org/10.3233/jcs-2011-0426.
Pełny tekst źródła田, 琛. "Searchable Symmetric Encryption System Based on Graphic Database." Computer Science and Application 06, no. 12 (2016): 778–85. http://dx.doi.org/10.12677/csa.2016.612093.
Pełny tekst źródłaSun, Xiaoqiang, Ting Wang, Zhiwei Sun, Ping Wang, Jianping Yu, and Weixin Xie. "An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption." International Journal of Theoretical Physics 56, no. 4 (2017): 1335–45. http://dx.doi.org/10.1007/s10773-017-3275-0.
Pełny tekst źródłaDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Pełny tekst źródłaCao, Suzhen, Junjian Yan, Zixuan Fang, and Caifen Wang. "A Searchable Encryption with Forward/Backward Security and Constant Storage." Applied Sciences 13, no. 4 (2023): 2181. http://dx.doi.org/10.3390/app13042181.
Pełny tekst źródłaXiong, Hongyan, Ting Wu, Yongxing Qi, et al. "An Efficient Searchable Symmetric Encryption Scheme for Smart Grid Data." Security and Communication Networks 2022 (November 19, 2022): 1–11. http://dx.doi.org/10.1155/2022/9993963.
Pełny tekst źródłaGuan, Wenhao, Yunling Wang, Jianfeng Wang, and Xiaotong Fu. "Verifiable memory leakage-resilient dynamic searchable encryption." Journal of High Speed Networks 24, no. 3 (2018): 201–17. http://dx.doi.org/10.3233/jhs-180591.
Pełny tekst źródłaSalmani, Khosro, and Ken Barker. "Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption." Advances in Science, Technology and Engineering Systems Journal 7, no. 2 (2022): 156–70. http://dx.doi.org/10.25046/aj070216.
Pełny tekst źródłaLiu, Xueqiao, Guomin Yang, Yi Mu, and Robert H. Deng. "Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage." IEEE Transactions on Dependable and Secure Computing 17, no. 6 (2020): 1322–32. http://dx.doi.org/10.1109/tdsc.2018.2876831.
Pełny tekst źródłaHu, Changhui, Lidong Han, and Siu Ming Yiu. "Efficient and secure multi-functional searchable symmetric encryption schemes." Security and Communication Networks 9, no. 1 (2015): 34–42. http://dx.doi.org/10.1002/sec.1376.
Pełny tekst źródłaYesin, V. I., and V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability." Radiotekhnika, no. 209 (June 24, 2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Pełny tekst źródłaHoang, Thang, Attila A. Yavuz, F. Betül Durak, and Jorge Guajardo. "A multi-server oblivious dynamic searchable encryption framework." Journal of Computer Security 27, no. 6 (2019): 649–76. http://dx.doi.org/10.3233/jcs-191300.
Pełny tekst źródłaWanshan, Xu, Zhang Jianbiao, and Yilin Yuan. "DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme." IEEE Access 8 (2020): 144480–88. http://dx.doi.org/10.1109/access.2020.3012975.
Pełny tekst źródłaDu, Ruizhong, Na Liu, Mingyue Li, and Junfeng Tian. "Block verifiable dynamic searchable encryption using redactable blockchain." Journal of Information Security and Applications 75 (June 2023): 103504. http://dx.doi.org/10.1016/j.jisa.2023.103504.
Pełny tekst źródłaXu, Lei, Huayi Duan, Anxin Zhou, Xingliang Yuan, and Cong Wang. "Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption." IEEE Transactions on Information Forensics and Security 16 (2021): 5310–25. http://dx.doi.org/10.1109/tifs.2021.3128823.
Pełny tekst źródła