咨询与建议

限定检索结果

文献类型

  • 32 篇 期刊文献

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 26 篇 计算机科学与技术...
    • 18 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
    • 1 篇 公安技术
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 公安学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 医学

主题

  • 32 篇 searchable encry...
  • 5 篇 attribute-based ...
  • 4 篇 cloud computing
  • 3 篇 data sharing
  • 3 篇 keyword search
  • 3 篇 blockchain
  • 3 篇 cloud storage
  • 2 篇 internet of thin...
  • 2 篇 smart contract
  • 2 篇 multi-keyword se...
  • 1 篇 multiple data ow...
  • 1 篇 secret sharing
  • 1 篇 bert model
  • 1 篇 blockchain,big d...
  • 1 篇 forward secure
  • 1 篇 access control
  • 1 篇 key-aggregate en...
  • 1 篇 public-key encry...
  • 1 篇 error-tolerant
  • 1 篇 data privacy

机构

  • 4 篇 school of scienc...
  • 2 篇 school of comput...
  • 1 篇 college of mathe...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 kunyao academy o...
  • 1 篇 school of cybers...
  • 1 篇 department of in...
  • 1 篇 international sc...
  • 1 篇 school of comput...
  • 1 篇 the university o...
  • 1 篇 school of inform...
  • 1 篇 guangxi cooperat...
  • 1 篇 faculty of infor...
  • 1 篇 state key labora...
  • 1 篇 college of cyber...
  • 1 篇 research&develop...
  • 1 篇 school of mathem...
  • 1 篇 the department o...
  • 1 篇 school of comput...

作者

  • 4 篇 chungen xu
  • 3 篇 xiaoling yu
  • 3 篇 cong zuo
  • 2 篇 lin mei
  • 2 篇 lei xu
  • 2 篇 ximeng liu
  • 1 篇 yeeun kim
  • 1 篇 likun xue
  • 1 篇 shingo yamaguchi
  • 1 篇 miaomiao tian
  • 1 篇 zhaofeng ma
  • 1 篇 kostas e.psannis
  • 1 篇 杜军强
  • 1 篇 haiyang yu
  • 1 篇 jie cui
  • 1 篇 shangmin dou
  • 1 篇 xin liu
  • 1 篇 dejun mu
  • 1 篇 hua peng
  • 1 篇 jianwei li

语言

  • 31 篇 英文
  • 1 篇 中文
检索条件"主题词=Searchable Encryption"
32 条 记 录,以下是1-10 订阅
排序:
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN Department of Information Science and Technology Jinan UniversityGuangzhou 510632China Department of Cyber Security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring *** particular,if the data system of acquired enterprise contains a searchable encryption mechan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
IXT: Improved searchable encryption for multi-word queries based on PSI
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 153-163页
作者: Yunbo YANG Xiaolei DONG Zhenfu CAO Jiachen SHEN Shangmin DOU Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai 200062China Kunyao Academy of Shanghai Kunyao Network Technology Co. Ltd.Shanghai 200233China PwC US Advisory Shanghai AC Shanghai 201203China
Oblivious Cross-Tags(OXT)[1]is the first efficient searchable encryption(SE)protocol for conjunctive queries in a single-writer single-reader ***,it also has a trade-off between security and efficiency by leaking part... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Blockchain-Assisted Secure Fine-Grained searchable encryption for a Cloud-Based Healthcare Cyber-Physical System
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第12期8卷 1877-1890页
作者: Mamta Brij B.Gupta Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi IEEE the Department of Computer Engineering National Institute of Technology the Asia University the Macquarie University the Department of Computer Science and Information Engineering Providence University the Computer Science and Software Engineering Shenzhen University the University of British Columbia the Department of Applied Informatics University of Macedonia the Graduate School of Sciences and Technology for Innovation Yamaguchi University
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keep... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Channel Free ID-Based searchable encryption for Peer-to-Peer Group
收藏 引用
Journal of Computer Science & Technology 2016年 第5期31卷 1012-1027页
作者: Xiao-Fen Wang Yi Mu Rongmao Chen Xiao-Song Zhang College of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Big Data Research Center University of Electronic Science and Technology of China Chengdu 611731 China School of Computing and Information Technology University of Wollongong Wollongong NSW 2500 Australia College of Computer National University of Defense Technology Changsha 410073 China
Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
收藏 引用
Science China(Information Sciences) 2021年 第8期64卷 195-212页
作者: Yanyu HUANG Siyi LV Zheli LIU Xiangfu SONG Jin LI Yali YUAN Changyu Dong College of Cyber Science and the College of Computer Science Tianjin Key Laboratory of Network and Data Security TechnologyNankai University School of Computer Science and Technology Shandong University School of Computer Science Guangzhou University Department of Computer Science University of G?ttingen School of Computing Newcastle University
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and searchable encryption
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 6161-6184页
作者: Zhen Wang Qiu-yu Zhang Ling-tao Meng Yi-lin Liu School of Computer and Communication Lanzhou University of TechnologyLanzhou730050China
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval *** research suggests a searchable encryption and deep hashing-base... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lattice-Based searchable encryption Scheme against Inside Keywords Guessing Attack
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1107-1125页
作者: Xiaoling Yu Chungen Xu Lei Xu Yuntao Wang School of Science Nanjing University of Science and TechnologyNanjing210094China School of Information Science Security and NetworksJapan Advanced Institute of Science and TechnologyIshikawa9231292Japan
To save the local storage,users store the data on the cloud server who offers convenient internet *** guarantee the data privacy,users encrypt the data before uploading them into the cloud *** encryption can reduce th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid cloud approach for block-level deduplication and searchable encryption in large universe
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2017年 第5期24卷 23-34页
作者: Liu Zhenhua Kang Yaqian Li Chen Fan Yaqing School of Mathematics and Statistics Xidian University Xi'an 710071 China
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval, and secure deduplication can save storage space by eliminating duplicate copi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A searchable encryption Scheme Based on Lattice for Log Systems in Blockchain
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 5429-5441页
作者: Gang Xu Yibo Cao Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang School of Information Science and Technology North China University of TechnologyBeijing100144China School of Information Engineering Inner Mongolia University of Science and TechnologyBaotou014010China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Electronic Engineering Dublin City UniversityDublinIreland
With the increasing popularity of cloud storage,data security on the cloud has become increasingly *** encryption has the ability to realize the privacy protection and security of data in the ***,with the continuous d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Blockchain-Based Credible and Secure Education Experience Data Management Scheme Supporting for searchable encryption
收藏 引用
China Communications 2021年 第6期18卷 172-183页
作者: Zihan Li Zhaofeng Ma International School Beijing University of Posts and TelecommunicationsBeijing 100876China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China
With the in-depth application of new technologies such as big data in education fields,the storage and sharing model of student education records data still faces many challenges in terms of privacy protection and eff... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论