Academic literature on the topic 'Data security keyword'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data security keyword.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data security keyword"
Babu, K. Ramesh, D. Ram Mohan Reddy, K. Srinivasa Rao, and Mamatha N. "Advanced Model for Keyword Search of Cloud Computing with Data Security." International Journal of Research Publication and Reviews 4, no. 12 (2023): 4985–89. http://dx.doi.org/10.55248/gengpi.4.1223.0134.
Full textZhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.
Full textAnupama, T. A., and M. A. Megha. "Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data." Journal of Network Security and Data Mining 6, no. 3 (2023): 17–23. https://doi.org/10.5281/zenodo.8195033.
Full textE., Anitha, V. Jothikantham P., and T. Senthilprakash Dr. "AN EFFICIENT SECURE DIFFERENT KEYWORD SEARCH IN ENCRYPTED CLOUD DATA." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 42–44. https://doi.org/10.5281/zenodo.345729.
Full textThigale, Satyam R. "Multiple Keyword Search in Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Full textMohammed, Hussein, and Ayad Abdulsada. "Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 1–10. http://dx.doi.org/10.37917/ijeee.17.2.1.
Full textVerma, Priyanka. "A STUDY OF SECURITY AND STORAGE OF DATA IN CLOUD COMPUTING ENVIRONMENT." international journal of advanced research in computer science 15, no. 6 (2024): 41–43. https://doi.org/10.26483/ijarcs.v15i6.7162.
Full textGupta, Teena, and Rohit K.V.S.S. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 63–67. http://dx.doi.org/10.35940/ijeat.a3842.1012122.
Full textTeena, Gupta, and K.V.S.S Rohit. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 1 (2022): 63–67. https://doi.org/10.35940/ijeat.A3842.1012122.
Full textKim, Kun Hee, and Seong Yong Hwang. "Analysis of social perception of security-related departments after COVID-19 using big data analysis." Korean Association For Learner-Centered Curriculum And Instruction 23, no. 16 (2023): 211–23. http://dx.doi.org/10.22251/jlcci.2023.23.16.211.
Full textDissertations / Theses on the topic "Data security keyword"
Cao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.
Full textArapantonis, Elpidoforos. "Data tampering in Vehicle CAN Bus networks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76776.
Full textBooks on the topic "Data security keyword"
Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textBook chapters on the topic "Data security keyword"
Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Secure Keyword Search." In Data Security in Cloud Storage. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_5.
Full textShi, Jie, Junzuo Lai, Yingjiu Li, Robert H. Deng, and Jian Weng. "Authorized Keyword Search on Encrypted Data." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11203-9_24.
Full textZheng, Qingji, Xiangxue Li, and Aytac Azgin. "CLKS: Certificateless Keyword Search on Encrypted Data." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_16.
Full textGolle, Philippe, Jessica Staddon, and Brent Waters. "Secure Conjunctive Keyword Search over Encrypted Data." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_3.
Full textChung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang, and Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption." In Future Data and Security Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.
Full textWang, Peishun, Huaxiong Wang, and Josef Pieprzyk. "Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups." In Cryptology and Network Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_13.
Full textKawai, Yutaka, Takato Hirano, Yoshihiro Koseki, and Tatsuji Munaka. "SEPM: Efficient Partial Keyword Search on Encrypted Data." In Cryptology and Network Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26823-1_6.
Full textBallard, Lucas, Seny Kamara, and Fabian Monrose. "Achieving Efficient Conjunctive Keyword Searches over Encrypted Data." In Information and Communications Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11602897_35.
Full textChang, Yan-Cheng, and Michael Mitzenmacher. "Privacy Preserving Keyword Searches on Remote Encrypted Data." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_30.
Full textDi Crescenzo, Giovanni, and Abhrajit Ghosh. "Privacy-Preserving Range Queries from Keyword Queries." In Data and Applications Security and Privacy XXIX. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_3.
Full textConference papers on the topic "Data security keyword"
Ramachandran, T. P., K. Shalini, S. Ranjith, L. Lakshmi Tejaswi, Ajay Bonde, and Nidal Abbas. "A Robust Fuzzy Based Multi-Keyword Similarity Search Model on Cloud Computing Platform Using Cipher Data Security Principles." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910578.
Full textSukeerthi, Kooragayala, R. Kesavan, and S. A. Kalaiselvan. "Multi-Keywords Based Fully Homomorphic Encryption and Data Classification for Cloud Security and Privacy." In 2024 2nd International Conference on Emerging Trends in Engineering and Medical Sciences (ICETEMS). IEEE, 2024. https://doi.org/10.1109/icetems64039.2024.10965006.
Full textQiu, Chunjing, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, and Tong Chen. "Intention-Aware Multi-channel Keyword Extension for Content Security." In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. http://dx.doi.org/10.1109/dsc.2018.00127.
Full textBhuvaneswari, E., V. Anjana Devi, and R. Gowri. "Fuzzy Search with Multi-Keyword Security and Improved Service Quality." In 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2023. http://dx.doi.org/10.1109/icdsaai59313.2023.10452573.
Full textLi, Yunfa, MingYi Li, and Nannan Xu. "Multi-attribute Fuzzy Keyword Retrieval Method for Secure Data Service in Cloud Computing." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.65.
Full textCui, Ningning, Jianxin Li, Xiaochun Yang, Bin Wang, Mark Reynolds, and Yong Xiang. "When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries." In 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 2019. http://dx.doi.org/10.1109/icde.2019.00097.
Full textJabeen, Afsha, and C. V. P. R. Prasad. "An Advanced Keyword Searching Model with Data Security in Cloud Computing." In 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2023. http://dx.doi.org/10.1109/icesc57686.2023.10193266.
Full textZhi-Peng, Jia, Zhang Ya-Ling, Wang Shang-Ping, and Sun Qin-Dong. "Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data." In 2013 Ninth International Conference on Computational Intelligence and Security (CIS). IEEE, 2013. http://dx.doi.org/10.1109/cis.2013.152.
Full textLi, Jiazhi, and Lei Zhang. "Attribute-Based Keyword Search and Data Access Control in Cloud." In 2014 Tenth International Conference on Computational Intelligence and Security (CIS). IEEE, 2014. http://dx.doi.org/10.1109/cis.2014.113.
Full textKumar, V. Naresh, and Kranthi Kiran G. "Confidentiality Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data." In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.12.
Full textReports on the topic "Data security keyword"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textShekeriak-Kushka, Yana. ETHICAL AND SECURITY ASPECTS OF DATA ANALYTICS IN JOURNALISM: THE CONTEXT OF THE RUSSIAN-UKRAINIAN WAR. Ivan Franko National University of Lviv, 2025. https://doi.org/10.30970/vjo.2025.56.13279.
Full textUlinskaitė, Jogilė. Lithuanian Populist Far-right (In)security Discourse During the European Parliament Elections in the face of Russia’s War Against Ukraine. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/rp0077.
Full textPasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full text