Artykuły w czasopismach na temat „Dynamic Searchable Symmetric Encryption”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Dynamic Searchable Symmetric Encryption”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Pełny tekst źródłaGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.
Pełny tekst źródłaKissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.
Pełny tekst źródłaEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Pełny tekst źródłaWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Pełny tekst źródłaZhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.
Pełny tekst źródłaCui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.
Pełny tekst źródłaZhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.
Pełny tekst źródłaBilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.
Pełny tekst źródłaHuang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.
Pełny tekst źródłaHe, Kun, Jing Chen, Qinxi Zhou, Ruiying Du, and Yang Xiang. "Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost." IEEE Transactions on Information Forensics and Security 16 (2021): 1538–49. http://dx.doi.org/10.1109/tifs.2020.3033412.
Pełny tekst źródłaHiemenz, Benedikt, and Michel Krämer. "Dynamic searchable symmetric encryption for storing geospatial data in the cloud." International Journal of Information Security 18, no. 3 (2018): 333–54. http://dx.doi.org/10.1007/s10207-018-0414-4.
Pełny tekst źródłaDu, Leilei, Kenli Li, Qin Liu, Zhiqiang Wu, and Shaobo Zhang. "Dynamic multi-client searchable symmetric encryption with support for boolean queries." Information Sciences 506 (January 2020): 234–57. http://dx.doi.org/10.1016/j.ins.2019.08.014.
Pełny tekst źródłaDuan, Gangqiang, and Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem." Electronics 12, no. 18 (2023): 3965. http://dx.doi.org/10.3390/electronics12183965.
Pełny tekst źródłaWang, Wei, Dongli Liu, Peng Xu, Laurence Tianruo Yang, and Kaitai Liang. "Keyword Search Shareable Encryption for Fast and Secure Data Replication." IEEE Transactions on Information Forensics and Security 18 (August 21, 2023): 5537–52. https://doi.org/10.1109/TIFS.2023.3306941.
Pełny tekst źródłaBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma, and Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control." Journal of Sensor and Actuator Networks 13, no. 1 (2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Pełny tekst źródłaYoon, Hyundo, Muncheon Yu, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. "Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption." Applied Sciences 14, no. 6 (2024): 2287. http://dx.doi.org/10.3390/app14062287.
Pełny tekst źródłaGuo, Cheng, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, and Bin Feng. "Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption." IEEE Transactions on Services Computing 13, no. 6 (2020): 1034–44. http://dx.doi.org/10.1109/tsc.2017.2768045.
Pełny tekst źródłaTi, Yen-Wu, Chia-Feng Wu, Chia-Mu Yu, and Sy-Yen Kuo. "Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications." IEEE Access 8 (2020): 1715–32. http://dx.doi.org/10.1109/access.2019.2961971.
Pełny tekst źródłaLi, Hongwei, Yi Yang, Yuanshun Dai, Shui Yu, and Yong Xiang. "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data." IEEE Transactions on Cloud Computing 8, no. 2 (2020): 484–94. http://dx.doi.org/10.1109/tcc.2017.2769645.
Pełny tekst źródłaLiu, Chang, Liehuang Zhu, and Jinjun Chen. "Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud." Journal of Network and Computer Applications 86 (May 2017): 3–14. http://dx.doi.org/10.1016/j.jnca.2016.09.010.
Pełny tekst źródłaSun, Lixue, Chunxiang Xu, and Yuan Zhang. "A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting." Journal of Information Security and Applications 40 (June 2018): 145–55. http://dx.doi.org/10.1016/j.jisa.2018.03.002.
Pełny tekst źródłaZhao, Minghao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, and Shaojing Li. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.094368.
Pełny tekst źródłaLi, Shaojing, Hao Wang, Qiuliang Xu, Han Jiang, Zhen Li, and Minghao Zhao. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.10015546.
Pełny tekst źródłaXu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, and Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain." PeerJ Computer Science 8 (March 21, 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.
Pełny tekst źródłaPeng, Xu, Susilo Willy, Wang Wei, et al. "ROSE: Robust Searchable Encryption with Forward and Backward Security." IEEE Transactions on Information Forensics and Security 17 (March 2, 2022): 1115–30. https://doi.org/10.1109/TIFS.2022.3155977.
Pełny tekst źródłaYuan, Dandan, Cong Zuo, Shujie Cui, and Giovanni Russello. "Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 40–58. http://dx.doi.org/10.56553/popets-2023-0040.
Pełny tekst źródłaBulbul, Salim Sabah, and Zaid Ameen Abduljabbar. "Performing Encrypted Cloud Data Keyword Searches Using Blockchain Technology on Smart Devices." Basrah Researches Sciences 50, no. 1 (2024): 17. http://dx.doi.org/10.56714/bjrs.50.1.24.
Pełny tekst źródłaPeng, Tianqi, Bei Gong, and Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain." Applied Sciences 13, no. 18 (2023): 10151. http://dx.doi.org/10.3390/app131810151.
Pełny tekst źródłaAmjad, Ghous, Seny Kamara, and Tarik Moataz. "Breach-Resistant Structured Encryption." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 245–65. http://dx.doi.org/10.2478/popets-2019-0014.
Pełny tekst źródłaZuo, Cong, Shangqi Lai, Shi-Feng Sun, et al. "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2025, no. 1 (2025): 440–55. http://dx.doi.org/10.56553/popets-2025-0024.
Pełny tekst źródłaPeng, Tianqi, Bei Gong, Shanshan Tu, et al. "Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT." Sensors 24, no. 23 (2024): 7597. http://dx.doi.org/10.3390/s24237597.
Pełny tekst źródłaMakhmudov, Teimur, and Vitalii Yesin. "Analysis of data search methods in cryptographically protected databases." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 6–21. http://dx.doi.org/10.26565/2519-2310-2022-2-01.
Pełny tekst źródłaBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Rana Jassim Mohammed, et al. "A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client." PLOS ONE 19, no. 4 (2024): e0301277. http://dx.doi.org/10.1371/journal.pone.0301277.
Pełny tekst źródłaNarayanareddy, Mugireddy Satya, Lekireddy Rajasekharreddy, Isani Swetha, and P. V. Jagadeeswara Prasad. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2736–41. http://dx.doi.org/10.61841/turcomat.v11i3.14517.
Pełny tekst źródłaShenigaram, Vidhya, Ladhwe Shri Megha, Rajasekharaiah Matada Kattigehally, and Swarnaja Mettu. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2696–702. http://dx.doi.org/10.61841/turcomat.v11i3.14483.
Pełny tekst źródłaPoh, Geong Sen, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, and Moesfa Soeheila Mohamad. "Searchable Symmetric Encryption." ACM Computing Surveys 50, no. 3 (2017): 1–37. http://dx.doi.org/10.1145/3064005.
Pełny tekst źródłaLi, Huige, Fangguo Zhang, and Chun-I. Fan. "Deniable Searchable Symmetric Encryption." Information Sciences 402 (September 2017): 233–43. http://dx.doi.org/10.1016/j.ins.2017.03.032.
Pełny tekst źródłaChase, Melissa, and Emily Shen. "Substring-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 263–81. http://dx.doi.org/10.1515/popets-2015-0014.
Pełny tekst źródłaLuo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Pełny tekst źródłaOGATA, Wakaha, and Kaoru KUROSAWA. "No-Dictionary Searchable Symmetric Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (2019): 114–24. http://dx.doi.org/10.1587/transfun.e102.a.114.
Pełny tekst źródłaETEMAD, Mohammad, and Alptekin KÜPÇÜ. "Verifiable dynamic searchable encryption." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 27, no. 4 (2019): 2606–23. http://dx.doi.org/10.3906/elk-1901-157.
Pełny tekst źródłaDai, Shuguang, Huige Li, and Fangguo Zhang. "Memory leakage-resilient searchable symmetric encryption." Future Generation Computer Systems 62 (September 2016): 76–84. http://dx.doi.org/10.1016/j.future.2015.11.003.
Pełny tekst źródłaLi, Huige, Haibo Tian, Fangguo Zhang, and Jiejie He. "Blockchain-based searchable symmetric encryption scheme." Computers & Electrical Engineering 73 (January 2019): 32–45. http://dx.doi.org/10.1016/j.compeleceng.2018.10.015.
Pełny tekst źródłaPoh, Geong Sen, Moesfa Soeheila Mohamad, and Ji-Jian Chin. "Searchable symmetric encryption over multiple servers." Cryptography and Communications 10, no. 1 (2017): 139–58. http://dx.doi.org/10.1007/s12095-017-0232-y.
Pełny tekst źródłaHan, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.
Pełny tekst źródłaDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Pełny tekst źródłaCao, Suzhen, Junjian Yan, Zixuan Fang, and Caifen Wang. "A Searchable Encryption with Forward/Backward Security and Constant Storage." Applied Sciences 13, no. 4 (2023): 2181. http://dx.doi.org/10.3390/app13042181.
Pełny tekst źródłaChoi, Daeseon, Seung-Hyun Kim, and Younho Lee. "Address Permutation for Privacy-Preserving Searchable Symmetric Encryption." ETRI Journal 34, no. 1 (2012): 66–75. http://dx.doi.org/10.4218/etrij.12.0111.0243.
Pełny tekst źródłaHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Pełny tekst źródła