Journal articles on the topic 'Data security keyword'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data security keyword.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Babu, K. Ramesh, D. Ram Mohan Reddy, K. Srinivasa Rao, and Mamatha N. "Advanced Model for Keyword Search of Cloud Computing with Data Security." International Journal of Research Publication and Reviews 4, no. 12 (2023): 4985–89. http://dx.doi.org/10.55248/gengpi.4.1223.0134.
Full textZhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.
Full textAnupama, T. A., and M. A. Megha. "Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data." Journal of Network Security and Data Mining 6, no. 3 (2023): 17–23. https://doi.org/10.5281/zenodo.8195033.
Full textE., Anitha, V. Jothikantham P., and T. Senthilprakash Dr. "AN EFFICIENT SECURE DIFFERENT KEYWORD SEARCH IN ENCRYPTED CLOUD DATA." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 42–44. https://doi.org/10.5281/zenodo.345729.
Full textThigale, Satyam R. "Multiple Keyword Search in Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.
Full textMohammed, Hussein, and Ayad Abdulsada. "Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 1–10. http://dx.doi.org/10.37917/ijeee.17.2.1.
Full textVerma, Priyanka. "A STUDY OF SECURITY AND STORAGE OF DATA IN CLOUD COMPUTING ENVIRONMENT." international journal of advanced research in computer science 15, no. 6 (2024): 41–43. https://doi.org/10.26483/ijarcs.v15i6.7162.
Full textGupta, Teena, and Rohit K.V.S.S. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology 12, no. 1 (2022): 63–67. http://dx.doi.org/10.35940/ijeat.a3842.1012122.
Full textTeena, Gupta, and K.V.S.S Rohit. "Fuzzy Keyword Search Over Encrypted Data using Cloud Computing." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 1 (2022): 63–67. https://doi.org/10.35940/ijeat.A3842.1012122.
Full textKim, Kun Hee, and Seong Yong Hwang. "Analysis of social perception of security-related departments after COVID-19 using big data analysis." Korean Association For Learner-Centered Curriculum And Instruction 23, no. 16 (2023): 211–23. http://dx.doi.org/10.22251/jlcci.2023.23.16.211.
Full textSrikanth, Y., M. Veeresh Babu, and P. Narasimhulu. "Combined Keyword Search over Encrypted Cloud Data Providing Security and Confidentiality." International Journal of Computer Applications 75, no. 4 (2013): 8–12. http://dx.doi.org/10.5120/13097-0394.
Full textZhu, Xijuan, Zifeng Xu, Chao Hu, and Jun Lin. "Privacy-Preserving Hierarchical Top-k Nearest Keyword Search on Graphs." Electronics 14, no. 4 (2025): 736. https://doi.org/10.3390/electronics14040736.
Full textTang, Yingying, Yuling Chen, Yun Luo, Sen Dong, and Tao Li. "VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme." Applied Sciences 13, no. 7 (2023): 4166. http://dx.doi.org/10.3390/app13074166.
Full textYang Chen, Yang Chen, Yang Liu Yang Chen, Jin Pan Yang Liu, Fei Gao Jin Pan, and Emmanouil Panaousis Fei Gao. "Privacy-Protecting Attribute-Based Conjunctive Keyword Search Scheme in Cloud Storage." 網際網路技術學刊 24, no. 1 (2023): 065–75. http://dx.doi.org/10.53106/160792642023012401007.
Full textChen, Yang, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, and Qiaoyan Wen. "Practical Attribute-Based Conjunctive Keyword Search Scheme." Computer Journal 63, no. 8 (2019): 1203–15. http://dx.doi.org/10.1093/comjnl/bxz140.
Full textWang, Wei, Dongli Liu, Peng Xu, Laurence Tianruo Yang, and Kaitai Liang. "Keyword Search Shareable Encryption for Fast and Secure Data Replication." IEEE Transactions on Information Forensics and Security 18 (August 21, 2023): 5537–52. https://doi.org/10.1109/TIFS.2023.3306941.
Full textXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, and Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain." PeerJ Computer Science 8 (March 21, 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Full textBandu, Mr Madar, L. Sai Kethana, M. Uday Sai Kiran, N. Meghan Satwik, and P. Keerthipriya. "Multi-Authority Attribute Based Keyword Search Over Encrypted Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem29193.
Full textLi, Ye, Mengen Xiong, Junling Yuan, Qikun Zhang, and Hongfei Zhu. "A Secure Data-Sharing Model Resisting Keyword Guessing Attacks in Edge–Cloud Collaboration Scenarios." Electronics 13, no. 16 (2024): 3236. http://dx.doi.org/10.3390/electronics13163236.
Full textWang, Xiangyu, Jianfeng Ma, Feng Li, Ximeng Liu, Yinbin Miao, and Robert H. Deng. "Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees." IEEE Transactions on Information Forensics and Security 16 (2021): 4909–23. http://dx.doi.org/10.1109/tifs.2021.3118880.
Full textOgata, Wakaha, and Takaaki Otemori. "Security analysis of secure kNN and ranked keyword search over encrypted data." International Journal of Information Security 19, no. 4 (2019): 419–25. http://dx.doi.org/10.1007/s10207-019-00461-y.
Full textRay, Indranil Ghosh. "On the Construction of Perfect Keyword Secure PEKS Scheme." International Journal on Cybernetics & Informatics 13, no. 2 (2024): 68–86. http://dx.doi.org/10.5121/ijci.2024.130206.
Full textJiang, Yongbo, Juncheng Lu, and Tao Feng. "Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain." Information 13, no. 11 (2022): 517. http://dx.doi.org/10.3390/info13110517.
Full textLu, Jingwei, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, and Qiong Huang. "Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security." Information 14, no. 3 (2023): 142. http://dx.doi.org/10.3390/info14030142.
Full textN. Sarode, Snehal, and Geetha R. Chillarge. "Efficient and Secure Multi-Keyword Ranked Search and Group Data Sharing for Encrypted Cloud Data." Journal of Scientific Research 66, no. 02 (2022): 68–78. http://dx.doi.org/10.37398/jsr.2022.660210.
Full textFan, Qing, Min Luo, Cong Peng, Lianhai Wang, and Debiao He. "IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search." Security and Communication Networks 2022 (November 1, 2022): 1–13. http://dx.doi.org/10.1155/2022/8453228.
Full textZhu, Binrui, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, and Jixin Ma. "A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks." Sensors 19, no. 11 (2019): 2583. http://dx.doi.org/10.3390/s19112583.
Full textVats, Satvik. "Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 243–52. http://dx.doi.org/10.17762/msea.v70i1.2305.
Full textZhou, Yunhong, Shihui Zheng, and Licheng Wang. "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud." Cryptography 4, no. 4 (2020): 28. http://dx.doi.org/10.3390/cryptography4040028.
Full textZhao, Meng, Lin-Gang Liu, Yong Ding, et al. "Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data." Applied Sciences 13, no. 5 (2023): 2847. http://dx.doi.org/10.3390/app13052847.
Full textDu, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.
Full textBasri, Ahmedi, and Ibrahimi Aferdita. "Mastering information security through standard implementation." International Journal of Informatics and Communication Technology 13, no. 3 (2024): 428–35. https://doi.org/10.11591/ijict.v13i3.pp428-435.
Full textK.Rama, Krishna, Sri Harsha Veeranki, Rajkumar Koppuravuri, Mastan Shaik, and Rakshan Kumar Pallepati. "Securing Organization's Data - A Role-Based Authorized Keyword Search Scheme with Efficient Decryption." International Journal for Modern Trends in Science and Technology 11, no. 04 (2025): 120–27. https://doi.org/10.5281/zenodo.15110678.
Full textRenugha, K., P. Shanthi, and A. Umamakeswari. "Multi-Keyword Ranked Search in Cloud Storage using Homomorphic Indexing." International Journal of Engineering & Technology 7, no. 2.24 (2018): 243. http://dx.doi.org/10.14419/ijet.v7i2.24.12057.
Full textZhang, Yu, Yin Li, and Yifan Wang. "Efficient Conjunctive Keywords Search over Encrypted E-Mail Data in Public Key Setting." Applied Sciences 9, no. 18 (2019): 3655. http://dx.doi.org/10.3390/app9183655.
Full textNarayanareddy, Mugireddy Satya, Lekireddy Rajasekharreddy, Isani Swetha, and P. V. Jagadeeswara Prasad. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2736–41. http://dx.doi.org/10.61841/turcomat.v11i3.14517.
Full textShenigaram, Vidhya, Ladhwe Shri Megha, Rajasekharaiah Matada Kattigehally, and Swarnaja Mettu. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2696–702. http://dx.doi.org/10.61841/turcomat.v11i3.14483.
Full textPing, Yuan, Wei Song, Zhili Zhang, Weiping Wang, and Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data." Information 11, no. 8 (2020): 394. http://dx.doi.org/10.3390/info11080394.
Full textMamta, Brij B. Gupta, and Syed Taqi Ali. "ISEkFT." Journal of Information Technology Research 12, no. 3 (2019): 133–53. http://dx.doi.org/10.4018/jitr.2019070108.
Full textNidhi., Sharma. "Cloud Based Secured Multi Keyword Ranked Search for Multi-Ownered." International Journal of Engineering Research and Advanced Technology (IJERAT) 3, no. 4 (2017): 23–30. https://doi.org/10.5281/zenodo.570177.
Full textBulbul, Salim Sabah, and Zaid Ameen Abduljabbar. "Performing Encrypted Cloud Data Keyword Searches Using Blockchain Technology on Smart Devices." Basrah Researches Sciences 50, no. 1 (2024): 17. http://dx.doi.org/10.56714/bjrs.50.1.24.
Full textSwapnil, D. Raut* Prof. Nitin R. Chopde. "KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 6 (2018): 264–74. https://doi.org/10.5281/zenodo.1284200.
Full textKurnia, Hanissa Rizki, Aisyah Zahrah, Elvia Ichsazene Dina Adha, and Nur Aini Rakhmawati. "Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer." JISKA (Jurnal Informatika Sunan Kalijaga) 8, no. 3 (2023): 231–42. http://dx.doi.org/10.14421/jiska.2023.8.3.231-242.
Full textKumar, Jaydip, Hemant Kumar, Karam Veer Singh, and Vipin Saxena. "Secure Data Storage and Retrieval over the Encrypted Cloud Computing." International Journal of Computer Network and Information Security 16, no. 4 (2024): 52–64. http://dx.doi.org/10.5815/ijcnis.2024.04.04.
Full textWang, Jianfeng, Hua Ma, Qiang Tang, et al. "Efficient verifiable fuzzy keyword search over encrypted data in cloud computing." Computer Science and Information Systems 10, no. 2 (2013): 667–84. http://dx.doi.org/10.2298/csis121104028w.
Full textSwapnil, D. Raut*, Avinash P. Wadhe Prof., and Jayant P. Mehare Prof. "A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 714–20. https://doi.org/10.5281/zenodo.48345.
Full textYılmaz, Vedat. "A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security." Balkan Journal of Electrical and Computer Engineering 13, no. 2 (2025): 210–18. https://doi.org/10.17694/bajece.1608364.
Full textZhang, Haoyu, Baodong Qin, and Dong Zheng. "Registered Keyword Searchable Encryption Based on SM9." Applied Sciences 13, no. 5 (2023): 3226. http://dx.doi.org/10.3390/app13053226.
Full textKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Full textSutrawe,, Ms Rajashree. "Ensuring Privacy and Recovery: Public Key Encryption for Secure Data De-Duplication with Keyword Search." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34127.
Full text