Journal articles on the topic 'Dynamic Searchable Symmetric Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Dynamic Searchable Symmetric Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Full textGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.
Full textKissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.
Full textEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Full textZhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.
Full textWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Full textCui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.
Full textZhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.
Full textBilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.
Full textHuang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.
Full textHe, Kun, Jing Chen, Qinxi Zhou, Ruiying Du, and Yang Xiang. "Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost." IEEE Transactions on Information Forensics and Security 16 (2021): 1538–49. http://dx.doi.org/10.1109/tifs.2020.3033412.
Full textHiemenz, Benedikt, and Michel Krämer. "Dynamic searchable symmetric encryption for storing geospatial data in the cloud." International Journal of Information Security 18, no. 3 (2018): 333–54. http://dx.doi.org/10.1007/s10207-018-0414-4.
Full textDu, Leilei, Kenli Li, Qin Liu, Zhiqiang Wu, and Shaobo Zhang. "Dynamic multi-client searchable symmetric encryption with support for boolean queries." Information Sciences 506 (January 2020): 234–57. http://dx.doi.org/10.1016/j.ins.2019.08.014.
Full textDuan, Gangqiang, and Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem." Electronics 12, no. 18 (2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Full textWang, Wei, Dongli Liu, Peng Xu, Laurence Tianruo Yang, and Kaitai Liang. "Keyword Search Shareable Encryption for Fast and Secure Data Replication." IEEE Transactions on Information Forensics and Security 18 (August 21, 2023): 5537–52. https://doi.org/10.1109/TIFS.2023.3306941.
Full textBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma, and Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control." Journal of Sensor and Actuator Networks 13, no. 1 (2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Full textYoon, Hyundo, Muncheon Yu, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. "Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption." Applied Sciences 14, no. 6 (2024): 2287. http://dx.doi.org/10.3390/app14062287.
Full textGuo, Cheng, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, and Bin Feng. "Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption." IEEE Transactions on Services Computing 13, no. 6 (2020): 1034–44. http://dx.doi.org/10.1109/tsc.2017.2768045.
Full textTi, Yen-Wu, Chia-Feng Wu, Chia-Mu Yu, and Sy-Yen Kuo. "Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications." IEEE Access 8 (2020): 1715–32. http://dx.doi.org/10.1109/access.2019.2961971.
Full textLi, Hongwei, Yi Yang, Yuanshun Dai, Shui Yu, and Yong Xiang. "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data." IEEE Transactions on Cloud Computing 8, no. 2 (2020): 484–94. http://dx.doi.org/10.1109/tcc.2017.2769645.
Full textLiu, Chang, Liehuang Zhu, and Jinjun Chen. "Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud." Journal of Network and Computer Applications 86 (May 2017): 3–14. http://dx.doi.org/10.1016/j.jnca.2016.09.010.
Full textSun, Lixue, Chunxiang Xu, and Yuan Zhang. "A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting." Journal of Information Security and Applications 40 (June 2018): 145–55. http://dx.doi.org/10.1016/j.jisa.2018.03.002.
Full textZhao, Minghao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, and Shaojing Li. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.094368.
Full textLi, Shaojing, Hao Wang, Qiuliang Xu, Han Jiang, Zhen Li, and Minghao Zhao. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.10015546.
Full textXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, and Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain." PeerJ Computer Science 8 (March 21, 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Full textPeng, Xu, Susilo Willy, Wang Wei, et al. "ROSE: Robust Searchable Encryption with Forward and Backward Security." IEEE Transactions on Information Forensics and Security 17 (March 2, 2022): 1115–30. https://doi.org/10.1109/TIFS.2022.3155977.
Full textYuan, Dandan, Cong Zuo, Shujie Cui, and Giovanni Russello. "Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 40–58. http://dx.doi.org/10.56553/popets-2023-0040.
Full textBulbul, Salim Sabah, and Zaid Ameen Abduljabbar. "Performing Encrypted Cloud Data Keyword Searches Using Blockchain Technology on Smart Devices." Basrah Researches Sciences 50, no. 1 (2024): 17. http://dx.doi.org/10.56714/bjrs.50.1.24.
Full textPeng, Tianqi, Bei Gong, and Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain." Applied Sciences 13, no. 18 (2023): 10151. http://dx.doi.org/10.3390/app131810151.
Full textAmjad, Ghous, Seny Kamara, and Tarik Moataz. "Breach-Resistant Structured Encryption." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 245–65. http://dx.doi.org/10.2478/popets-2019-0014.
Full textZuo, Cong, Shangqi Lai, Shi-Feng Sun, et al. "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2025, no. 1 (2025): 440–55. http://dx.doi.org/10.56553/popets-2025-0024.
Full textPeng, Tianqi, Bei Gong, Shanshan Tu, et al. "Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT." Sensors 24, no. 23 (2024): 7597. http://dx.doi.org/10.3390/s24237597.
Full textMakhmudov, Teimur, and Vitalii Yesin. "Analysis of data search methods in cryptographically protected databases." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 6–21. http://dx.doi.org/10.26565/2519-2310-2022-2-01.
Full textBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Rana Jassim Mohammed, et al. "A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client." PLOS ONE 19, no. 4 (2024): e0301277. http://dx.doi.org/10.1371/journal.pone.0301277.
Full textNarayanareddy, Mugireddy Satya, Lekireddy Rajasekharreddy, Isani Swetha, and P. V. Jagadeeswara Prasad. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2736–41. http://dx.doi.org/10.61841/turcomat.v11i3.14517.
Full textShenigaram, Vidhya, Ladhwe Shri Megha, Rajasekharaiah Matada Kattigehally, and Swarnaja Mettu. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2696–702. http://dx.doi.org/10.61841/turcomat.v11i3.14483.
Full textPoh, Geong Sen, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, and Moesfa Soeheila Mohamad. "Searchable Symmetric Encryption." ACM Computing Surveys 50, no. 3 (2017): 1–37. http://dx.doi.org/10.1145/3064005.
Full textLi, Huige, Fangguo Zhang, and Chun-I. Fan. "Deniable Searchable Symmetric Encryption." Information Sciences 402 (September 2017): 233–43. http://dx.doi.org/10.1016/j.ins.2017.03.032.
Full textChase, Melissa, and Emily Shen. "Substring-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 263–81. http://dx.doi.org/10.1515/popets-2015-0014.
Full textLuo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Full textOGATA, Wakaha, and Kaoru KUROSAWA. "No-Dictionary Searchable Symmetric Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (2019): 114–24. http://dx.doi.org/10.1587/transfun.e102.a.114.
Full textETEMAD, Mohammad, and Alptekin KÜPÇÜ. "Verifiable dynamic searchable encryption." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 27, no. 4 (2019): 2606–23. http://dx.doi.org/10.3906/elk-1901-157.
Full textDai, Shuguang, Huige Li, and Fangguo Zhang. "Memory leakage-resilient searchable symmetric encryption." Future Generation Computer Systems 62 (September 2016): 76–84. http://dx.doi.org/10.1016/j.future.2015.11.003.
Full textLi, Huige, Haibo Tian, Fangguo Zhang, and Jiejie He. "Blockchain-based searchable symmetric encryption scheme." Computers & Electrical Engineering 73 (January 2019): 32–45. http://dx.doi.org/10.1016/j.compeleceng.2018.10.015.
Full textPoh, Geong Sen, Moesfa Soeheila Mohamad, and Ji-Jian Chin. "Searchable symmetric encryption over multiple servers." Cryptography and Communications 10, no. 1 (2017): 139–58. http://dx.doi.org/10.1007/s12095-017-0232-y.
Full textHan, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.
Full textDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Full textCao, Suzhen, Junjian Yan, Zixuan Fang, and Caifen Wang. "A Searchable Encryption with Forward/Backward Security and Constant Storage." Applied Sciences 13, no. 4 (2023): 2181. http://dx.doi.org/10.3390/app13042181.
Full textChoi, Daeseon, Seung-Hyun Kim, and Younho Lee. "Address Permutation for Privacy-Preserving Searchable Symmetric Encryption." ETRI Journal 34, no. 1 (2012): 66–75. http://dx.doi.org/10.4218/etrij.12.0111.0243.
Full textHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Full text