Academic literature on the topic 'Secure search'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure search.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure search"
Raykova, Mariana, Ang Cui, Binh Vo, et al. "Usable, Secure, Private Search." IEEE Security & Privacy 10, no. 5 (2012): 53–60. http://dx.doi.org/10.1109/msp.2011.155.
Full textGold, Steve. "In search of secure outsourcing." Computer Fraud & Security 2009, no. 2 (2009): 13–15. http://dx.doi.org/10.1016/s1361-3723(09)70021-1.
Full textVaria, Mayank, Benjamin Price, Nicholas Hwang, et al. "Automated Assessment of Secure Search Systems." ACM SIGOPS Operating Systems Review 49, no. 1 (2015): 22–30. http://dx.doi.org/10.1145/2723872.2723877.
Full textRomanova, Z. "Latin America in Search for Secure Economy." World Economy and International Relations, no. 11 (2003): 91–101. http://dx.doi.org/10.20542/0131-2227-2003-11-91-101.
Full textLewis, Robert. "Bioenergetics In Search Of A Secure Self." Clinical Journal of the International Institute for Bioenergetic Analysis 17, no. 1 (2007): 135–64. http://dx.doi.org/10.30820/0743-4804-2007-17-135.
Full textAmbika, M., Mangayarkarasi N., Raghuraman Gopalsamy, L. Sai Ramesh, and Kamalanathan Selvakumar. "Secure and Dynamic Multi-Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (2021): 1–10. http://dx.doi.org/10.4018/ijoris.20210701.oa3.
Full textHarane, Swati T. "SECURE SEARCH OVER ENCRYPTED DATA TECHNIQUES : SURVEY." International Journal of Advanced Research in Computer Science 8, no. 7 (2017): 575–77. http://dx.doi.org/10.26483/ijarcs.v8i7.4266.
Full textZhu, Yi, Xingming Sun, Zhihua Xia, and Naixue Xiong. "Secure Similarity Search over Encrypted Cloud Images." International Journal of Security and Its Applications 9, no. 8 (2015): 1–14. http://dx.doi.org/10.14257/ijsia.2015.9.8.01.
Full textEl Defrawy, Karim, and Sky Faber. "Blindfolded Data Search via Secure Pattern Matching." Computer 46, no. 12 (2013): 68–75. http://dx.doi.org/10.1109/mc.2013.73.
Full textLi, Jin, Xiaofeng Chen, Fatos Xhafa, and Leonard Barolli. "Secure deduplication storage systems supporting keyword search." Journal of Computer and System Sciences 81, no. 8 (2015): 1532–41. http://dx.doi.org/10.1016/j.jcss.2014.12.026.
Full textDissertations / Theses on the topic "Secure search"
Katsilieris, Fotios. "Search and secure using mobile robots." Thesis, KTH, Reglerteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105718.
Full textWang, Boyang, and Boyang Wang. "Secure Geometric Search on Encrypted Spatial Data." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625567.
Full textWang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.
Full textCao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.
Full textWoodworth, Jason W. "Secure Semantic Search over Encrypted Big Data in the Cloud." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10286646.
Full textKulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.
Find full textSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Full textTowell, Alexander R. "Encrypted Search| Enabling Standard Information Retrieval Techniques for Several New Secure Index Types While Preserving Confidentiality Against an Adversary With Access to Query Histories and Secure Index Contents." Thesis, Southern Illinois University at Edwardsville, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1601582.
Full textDahl, Linnéa, and Hanna Sandström. "In Search for Secure Families : A study of what qualifies as a suitable family for vulnerable children at a child protection organization in South Africa." Thesis, Hälsohögskolan, Högskolan i Jönköping, HHJ, Avd. för beteendevetenskap och socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40856.
Full textPriddis, DeAnne. "The search for work-life balance at SECURA." Menomonie, WI : University of Wisconsin--Stout, 2006. http://www.uwstout.edu/lib/thesis/2006/2006priddisd.pdf.
Full textBooks on the topic "Secure search"
Davis-Secord, Sarah. Migration in the Medieval Mediterranean. Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9781641892667.
Full textAkulov, Nikolay. TESTING OF SEDIMENTARY DEPOSITS AT DIAMOND SEARCHING WORKS. AUS PUBLISHERS, 2022. http://dx.doi.org/10.26526/monography_62021f624d9c18.71126120.
Full textC, Green Laura, and Roberts Marc J, eds. In search of safety: Chemicals and cancer risk. Harvard University Press, 1988.
Find full text1943-, Boyer Robert, ed. The search for labour market flexibility: The European economies in transition. Clarendon Press, 1988.
Find full textHolmes, Jeremy. The Search for the Secure Base. Routledge, 2014. http://dx.doi.org/10.4324/9781315783260.
Full textHolmes, Jeremy. Search for the Secure Base: Attachment Theory and Psychotherapy. Taylor & Francis Group, 2014.
Find full textHolmes, Jeremy. Search for the Secure Base: Attachment Theory and Psychotherapy. Taylor & Francis Group, 2014.
Find full textThe search for the secure base: Attachment theory and psychotherapy. Brunner-Routledge, 2001.
Find full textBook chapters on the topic "Secure search"
Zhang, Yuan, Chunxiang Xu, and Xuemin Sherman Shen. "Secure Keyword Search." In Data Security in Cloud Storage. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4374-6_5.
Full textHazay, Carmit, and Yehuda Lindell. "Search Problems." In Efficient Secure Two-Party Protocols. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14303-8_9.
Full textOhtake, Go, Reihaneh Safavi-Naini, and Liang Feng Zhang. "Outsourcing of Verifiable Attribute-Based Keyword Search." In Secure IT Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_2.
Full textPark, Hyun-A., Jin Wook Byun, and Dong Hoon Lee. "Secure Index Search for Groups." In Trust, Privacy, and Security in Digital Business. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11537878_14.
Full textSun, Wenhai, Wenjing Lou, Y. Thomas Hou, and Hui Li. "Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_9.
Full textLi, You, Kaiyu Hou, Yunqi He, Yan Chen, and Hai Zhou. "Property Guided Secure Configuration Space Search." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-75764-8_8.
Full textKim, Jinhan, Michael G. Epitropakis, and Shin Yoo. "Learning Without Peeking: Secure Multi-party Computation Genetic Programming." In Search-Based Software Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99241-9_13.
Full textZou, Yanzhen, Changsheng Liu, Yong Jin, and Bing Xie. "Assessing Software Quality through Web Comment Search and Analysis." In Safe and Secure Software Reuse. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38977-1_14.
Full textGolle, Philippe, Jessica Staddon, and Brent Waters. "Secure Conjunctive Keyword Search over Encrypted Data." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_3.
Full textKrell, Fernando, Gabriela Ciocarlie, Ashish Gehani, and Mariana Raykova. "Low-Leakage Secure Search for Boolean Expressions." In Topics in Cryptology – CT-RSA 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52153-4_23.
Full textConference papers on the topic "Secure search"
Singh, Akansha, Venkata Bhikshapathi Chenam, and Syed Taqi Ali. "Enhanced provably secure public key encryption with keyword search scheme for secure cloud-based keyword search." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725485.
Full textWang, Xuejian, and Baodong Qin. "Multi-keyword secure search of encrypted cloud data based on semantics." In 2024 6th International Conference on Natural Language Processing (ICNLP). IEEE, 2024. http://dx.doi.org/10.1109/icnlp60986.2024.10692872.
Full textZhong, Ziyang, Pan Chang, and Min Cai. "Achieving efficient and secure keyword attribute community search on cloud servers." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038169.
Full textPark, Hyun-A., Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan. "Secure Similarity Search." In 2007 IEEE International Conference on Granular Computing (GRC 2007). IEEE, 2007. http://dx.doi.org/10.1109/grc.2007.4403170.
Full textPark, Hyun-A., Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan. "Secure Similarity Search." In 2007 IEEE International Conference on Granular Computing (GRC 2007). IEEE, 2007. http://dx.doi.org/10.1109/grc.2007.70.
Full textSILAGHI, MARIUS-CĂLIN, DJAMILA SAM-HAROUD, and BOI FALTINGS. "SECURE ASYNCHRONOUS SEARCH." In Proceedings of the 2nd Asia-Pacific Conference on IAT. WORLD SCIENTIFIC, 2001. http://dx.doi.org/10.1142/9789812811042_0054.
Full textRaykova, Mariana, Binh Vo, Steven M. Bellovin, and Tal Malkin. "Secure anonymous database search." In the 2009 ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655008.1655025.
Full textUchiyama, Tomoki, and Kana Shimizu. "Secure Full-Text Search Using Function Secret Sharing." In CCS '24: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2023. http://dx.doi.org/10.1145/3689943.3695052.
Full textHahn, Florian, Nicolas Loza, and Florian Kerschbaum. "Practical and Secure Substring Search." In SIGMOD/PODS '18: International Conference on Management of Data. ACM, 2018. http://dx.doi.org/10.1145/3183713.3183754.
Full textBailey, Peter, David Hawking, and Brett Matson. "Secure search in enterprise webs." In the 15th ACM international conference. ACM Press, 2006. http://dx.doi.org/10.1145/1183614.1183686.
Full textReports on the topic "Secure search"
Aldrich, Susan. Oracle Secure Enterprise Search V. 10.1.8 Evaluation. Patricia Seybold Group, 2006. http://dx.doi.org/10.1571/pr12-21-06cc.
Full textNance, Brad. Using Splunk® Enterprise Search Commands for Advanced Analysis of Ivanti Connect Secure© Logs. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1872843.
Full textHarbitz, Mia Elisabeth, and María del Carmen Tamargo. The Significance of Legal Identity in Situations of Poverty and Social Exclusion: The Link between Gender, Ethnicity, and Legal Identity. Inter-American Development Bank, 2009. http://dx.doi.org/10.18235/0009023.
Full textLanglais, Pierre-Carl. Bibliometrics. Comité pour la science ouverte, 2023. https://doi.org/10.52949/73.
Full textSlattery, Kevin T. Unsettled Aspects of the Digital Thread in Additive Manufacturing. SAE International, 2021. http://dx.doi.org/10.4271/epr2021026.
Full text