To see the other types of publications on this topic, follow the link: Dynamic Searchable Symmetric Encryption.

Dissertations / Theses on the topic 'Dynamic Searchable Symmetric Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 dissertations / theses for your research on the topic 'Dynamic Searchable Symmetric Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nordahl, Christian, and Malin Lindström. "The BXT-Bitmap : An Efficient Searchable Symmetric Encryption Scheme." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.

Full text
Abstract:
Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data confidentiality. Encryption and efficient accessibility are naturally at odds, as for instance strong encryption necessitates that ciphertexts reveal nothing about underlying data. Searchable encryption is an active field in cryptography studying encryption schemes that provide varying levels of efficiency, functionality, and security, and efficient searchable encryption focuses on schemes enabling sub-linear (in the size of the database) sear
APA, Harvard, Vancouver, ISO, and other styles
3

Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.

Full text
Abstract:
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their u
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Chia-Feng, and 吳嘉峰. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69702371852681789221.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>103<br>Searchable symmetric encryption (SSE) is a more and more important technique for cloud computing. It lets us can store critical data by encryption in the untrusted cloud server but allows us search the encrypted data with the keyword. The server will not know the keyword and the data content but it can retrieval the correct data to us. However, a database with SSE is not enough practical because the data is not invariable. In general, we modify the data frequently even if it stores in the remote server. The server must can update the encrypted data without de
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Cheng-Wei, and 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>101<br>We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his fi
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Akash. "Efficient and Secure Search over Encrypted Data." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.

Full text
Abstract:
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the client has to retrieve the entire data and decrypt it in order to get results for a search query then that will defeat the purpose of outsourcing. A solution to this problem is Searchable Encryption that provides a reasonable trade-off between security and effciency. Our first contribution is in the context of Dynamic Searchable Symmetric Encryption (DSSE). DSSE schemes
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Li-Tzu, and 張儷子. "Efficient Conjunctive Keyword-Based Symmetric Searchable Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/rp5p8u.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>99<br>In the era of cloud computing, private information in the open network server can be accessed anywhere and anytime. As a result, the protection of personal private informa-tion becomes very important. Keyword-searchable encryption has been proposed to protect private information stored in servers while allowing clients to retrieve needed information based on keyword searching. In this thesis, we propose an efficient key-word-searchable encryption scheme. The proposed scheme with conjunctive keyword search is secure against adaptive chosen keyword attacks. Mo
APA, Harvard, Vancouver, ISO, and other styles
8

Oliveira, Filipe Miguel Santos de. "A Systems Approach to Searchable Encryption." Master's thesis, 2020. http://hdl.handle.net/10362/116774.

Full text
Abstract:
The expansion of cloud services facilitates access to hardware and software resources. The number of clients has been raising and so, the amount of data in the cloud provider’s servers. Lots of this data have personal pieces of information that must be protected to guarantee privacy for data owners. Searchable encryption (SE) and symmetric searchable encryption (SSE) provide an effi cient way to protect data and enable searching operations when stored in cloud provider’s servers. Although all the work in this area some details are left outside the scope or for future consideration. Is ne
APA, Harvard, Vancouver, ISO, and other styles
9

Jheng, Ren-Jen, and 鄭仁傑. "Research and Implementation of Unlinkable Searchable Symmetric Encryption Schemes for Cloud Storage." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/41868079914619377925.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊工程系碩士班<br>101<br>The cloud storage service provides users a very convenient and omnipresent way to store and access data. Behind the convenient service, however, there exist many security issues. Services hardware equipment is not a user can control or during the transfer of files may be intercepted. In order to protect data, many users will encrypt their files in advance before uploading them to the cloud storage. But the original search method has been unable to effectively search the cipher text. Therefore, how to achieve an efficient and secure search on cipher text becom
APA, Harvard, Vancouver, ISO, and other styles
10

Borges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment." Master's thesis, 2018. http://hdl.handle.net/10362/59506.

Full text
Abstract:
Cloud computing has become a standard computational paradigm due its numerous advantages, including high availability, elasticity, and ubiquity. Both individual users and companies are adopting more of its services, but not without loss of privacy and control. Outsourcing data and computations to a remote server implies trusting its owners, a problem many end-users are aware. Recent news have proven data stored on Cloud servers is susceptible to leaks from the provider, third-party attackers, or even from government surveillance programs, exposing users’ private data. Different approach
APA, Harvard, Vancouver, ISO, and other styles
11

HSU, CHING-YAO, and 許景堯. "A Study On Multilevel Dynamic Symmetric Block Encryption Scheme." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/92mv62.

Full text
Abstract:
碩士<br>國立彰化師範大學<br>資訊管理學系所<br>105<br>In recent years, data leakage incidents occurred frequently, which caused significant financial losses to individuals as well as businesses. In order to prevent such security events, one possible solution is to encrypt essential database information. In this paper, we proposed a Multilevel Dynamic Symmetric Block Encryption Scheme, which is able to dynamically encrypt and decrypt data in the database. In the case of a plaintext containing 100 characters, our proposed scheme may result in dynamic encryption combinations that are approximately between 10 604 a
APA, Harvard, Vancouver, ISO, and other styles
12

kuo, shujen, and 虢恕仁. "A Study on Symmetric Dynamic Block Encryption Scheme with Pseudo Random Number." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/91130530392271154207.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>98<br>As the popularity of the Internet, it becomes more convenient to exchange data. No matter in business, government, academic organizations or education units, more and more of the links through the network of computers to exchange a variety of data. During the process of data exchange, however, the incensement of computer virus, hacker, network eavesdropping and Replay attacks enlarge the threat of information security. In order to prevent from these intentional attacks, the information security of the network becomes one of the most important topics of today.
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Chin-Shun, and 楊欽舜. "A Study on Dynamic Symmetric Block Encryption Scheme with Pseudo Random Number." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15477813936151189545.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>97<br>Information security has become the key factor for the successful development of the Internet and related applications. There are many ways to achieve information security. Data block cipher is the most significant and important mechanism of the symmetric cryptography when dealing with data encryption and decryption. Many scholars proposed substitution and permutation algorithms to disturb plaintext in order to avoid being decoded.   This study attempts to take blocks as units in order to deal with plaintext data. Unit code, passphrasing and timestamp informat
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Hsien Chou, and 陳憲洲. "A Study on Cipher Block Chaining Symmetric Block Encryption Scheme with Dynamic Pseudo Random Numbers." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/29758544020313816966.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>99<br>For military information staffs, the information security is an important issue needs to be understood very well in the R.O.C. military. There are many information security attacks from the P.R.O.C. cyber forces and their attack skills keep refining and changing. Although many information security defense mechanisms, such as: firewall, invasion protection system, and antivirus software, are adopted to assure the information security of the military. However, for the military, it is still possible that confidential information can be eavesdropped through networ
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Hongjen, and 陳宏仁. "A Study On Symmetric Encryption Scheme With Dynamic Data Scramble Module Combination And Pseudo Random Numbers." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/41141923974091451445.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>100<br>Internet security has become a global issue. Usually,a country has more IT applications; it needs pay more attentions to assure information security for its IT applications. Nowadays, many information security attacks from the P.R.C. cyber forces to steal military confidential information. Thus, it is important for us to have a security mechanism to protect confidential information, especially for confidential information in military. Data encryption is the best mechanism to assure confidentiality of classified information. This study proposes a CBC symmetric
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!