ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Mathematics
Computing
Computing
Pure sciences
Physical
Research
Industrial engineer
Mechanical Engineering
Architecture and Urbanism
all records (71)

Languages
English
German
Spanish
Portuguese

Countries
Indonesia
USA
Ukraine
Australia
Italy
Denmark
India
Brazil
Switzerland
Czech Republic
all records (62)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
2.112  Articles
1 of 212 pages  |  10  records  |  more records»
The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time. One line of research with this double motivation is the study ... see more

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve s... see more

Cloud computing has produced a paradigm shift in large-scale data outsourcing and computing. As the cloud server itself cannot be trusted, it is essential to store the data in encrypted form, which however makes it unsuitable to perform searching, computa... see more

Cloud have enormous storage space for storing immense size of data. Data owner redistribute their data substance on cloud server. Cloud server can have enormous storage space. In this paper, data client demand for data to the cloud server. Data owner prod... see more

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack efficient... see more

This paper presents an improved Secure Index scheme as a searchable symmetric encryption technique and provides a solution that enables a secure and efficient data storage and retrieval  system. Secure Index scheme, conceived by Goh, is based on stan... see more

Data protection is representing a huge trade in the modern era; the vast communication development gave this field increased attention from all sorts of parties (friends and foes); integral transforms have played a decent role in many methods that are pro... see more

Cryptography is an encryption technique, where the data to be encrypted will be encrypted using a key to become data that is difficult to read by other parties who do not have a decryption key. The DES algorithm is a symmetric block cipher cryptographic a... see more

1 of 212 pages  |  10  records  |  more records»