咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 29 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 9 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 材料科学与工程(可...
    • 5 篇 控制科学与工程
    • 5 篇 软件工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 1 篇 机械工程
  • 12 篇 理学
    • 11 篇 数学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学

主题

  • 30 篇 searchable encry...
  • 5 篇 attribute-based ...
  • 3 篇 data sharing
  • 3 篇 blockchain
  • 3 篇 cloud computing
  • 3 篇 cloud storage
  • 2 篇 internet of thin...
  • 2 篇 smart contract
  • 2 篇 keyword search
  • 2 篇 multi-keyword se...
  • 1 篇 multiple data ow...
  • 1 篇 bert model
  • 1 篇 key-aggregate en...
  • 1 篇 public-key encry...
  • 1 篇 iot divices
  • 1 篇 lattice assumpti...
  • 1 篇 lattice
  • 1 篇 relevance score
  • 1 篇 verifiable
  • 1 篇 deep supervised ...

机构

  • 4 篇 school of scienc...
  • 2 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 no.30 inst china...
  • 1 篇 college of data ...
  • 1 篇 school of inform...
  • 1 篇 college of compu...
  • 1 篇 guangxi cooperat...
  • 1 篇 research&develop...
  • 1 篇 shanghai key lab...
  • 1 篇 the university o...
  • 1 篇 school of cybers...
  • 1 篇 faculty of infor...
  • 1 篇 the department o...
  • 1 篇 big data researc...
  • 1 篇 ieee
  • 1 篇 state key labora...
  • 1 篇 china mobileinfo...
  • 1 篇 dept.of computer...

作者

  • 4 篇 chungen xu
  • 3 篇 xiaoling yu
  • 3 篇 cong zuo
  • 2 篇 lin mei
  • 2 篇 ximeng liu
  • 2 篇 lei xu
  • 1 篇 likun xue
  • 1 篇 zhaofeng ma
  • 1 篇 kostas e.psannis
  • 1 篇 xin liu
  • 1 篇 hua peng
  • 1 篇 fan yaqing
  • 1 篇 devesh cjinwala
  • 1 篇 bennian dou
  • 1 篇 zhiquan liu
  • 1 篇 bowen zhao
  • 1 篇 xiu-bo chen
  • 1 篇 fu jingyi
  • 1 篇 gautam srivastav...
  • 1 篇 yang lu

语言

  • 30 篇 英文
检索条件"主题词=searchable encryption"
30 条 记 录,以下是1-10 订阅
排序:
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN Department of Information Science and Technology Jinan UniversityGuangzhou 510632China Department of Cyber Security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring enterprise.In particular,if the data system of acquired enterprise contains a searchable encrypt... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IXT: Improved searchable encryption for multi-word queries based on PSI
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 153-163页
作者: Yunbo YANG Xiaolei DONG Zhenfu CAO Jiachen SHEN Shangmin DOU Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai 200062China Kunyao Academy of Shanghai Kunyao Network Technology Co. Ltd.Shanghai 200233China PwC US Advisory Shanghai AC Shanghai 201203China
Oblivious Cross-Tags(OXT)[1]is the first efficient searchable encryption(SE)protocol for conjunctive queries in a single-writer single-reader framework.However,it also has a trade-off between security and efficiency b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and searchable encryption
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 6161-6184页
作者: Zhen Wang Qiu-yu Zhang Ling-tao Meng Yi-lin Liu School of Computer and Communication Lanzhou University of TechnologyLanzhou730050China
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep ha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A searchable encryption Scheme Based on Lattice for Log Systems in Blockchain
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 5429-5441页
作者: Gang Xu Yibo Cao Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang School of Information Science and Technology North China University of TechnologyBeijing100144China School of Information Engineering Inner Mongolia University of Science and TechnologyBaotou014010China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Electronic Engineering Dublin City UniversityDublinIreland
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Forward and backward secure searchable encryption with multi-keyword search and result verification
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 270-272页
作者: Jie CUI Yue SUN Yan XU Miaomiao TIAN Hong ZHONG School of Computer Science and Technology Anhui University Institute of Physical Science and Information Technology Anhui University Anhui Engineering Laboratory of LoT Security Technologies Anhui University
Dear editor,searchable encryption [1] is a new search method that not only protects personal privacy, but also searches over encrypted data. The multi-keyword scheme can search documents with more keywords so that the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
MULKASE:a novel approach for key-aggregate searchable encryption for multi-owner data
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第12期20卷 1717-1748页
作者: Mukti PADHYA Devesh CJINWALA Department of Computer Engineering Sardar Vallabhbhai National Institute of TechnologySurat 394000India Department of Computer Science and Engineering Indian Institute of TechnologyJammu 180001India
Recent attempts at key-aggregate searchable encryption(KASE) combine the advantages of searching encrypted data with support for data owners to share an aggregate searchable key with a user delegating search rights to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
收藏 引用
Science China(Information Sciences) 2021年 第8期64卷 195-212页
作者: Yanyu HUANG Siyi LV Zheli LIU Xiangfu SONG Jin LI Yali YUAN Changyu Dong College of Cyber Science and the College of Computer Science Tianjin Key Laboratory of Network and Data Security TechnologyNankai University School of Computer Science and Technology Shandong University School of Computer Science Guangzhou University Department of Computer Science University of G?ttingen School of Computing Newcastle University
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Blockchain-Assisted Secure Fine-Grained searchable encryption for a Cloud-Based Healthcare Cyber-Physical System
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第12期8卷 1877-1890页
作者: Mamta Brij B.Gupta Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi IEEE the Department of Computer Engineering National Institute of Technology the Asia University the Macquarie University the Department of Computer Science and Information Engineering Providence University the Computer Science and Software Engineering Shenzhen University the University of British Columbia the Department of Applied Informatics University of Macedonia the Graduate School of Sciences and Technology for Innovation Yamaguchi University
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Channel Free ID-Based searchable encryption for Peer-to-Peer Group
收藏 引用
Journal of Computer Science & Technology 2016年 第5期31卷 1012-1027页
作者: Xiao-Fen Wang Yi Mu Rongmao Chen Xiao-Song Zhang College of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Big Data Research Center University of Electronic Science and Technology of China Chengdu 611731 China School of Computing and Information Technology University of Wollongong Wollongong NSW 2500 Australia College of Computer National University of Defense Technology Changsha 410073 China
Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lattice-Based searchable encryption Scheme against Inside Keywords Guessing Attack
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1107-1125页
作者: Xiaoling Yu Chungen Xu Lei Xu Yuntao Wang School of Science Nanjing University of Science and TechnologyNanjing210094China School of Information Science Security and NetworksJapan Advanced Institute of Science and TechnologyIshikawa9231292Japan
To save the local storage,users store the data on the cloud server who offers convenient internet services.To guarantee the data privacy,users encrypt the data before uploading them into the cloud server.Since encrypt... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论