X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (504) 504
Conference Proceeding (399) 399
Publication (20) 20
Dissertation (9) 9
Book Chapter (7) 7
Magazine Article (2) 2
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
searchable encryption (630) 630
encryption (382) 382
cloud computing (371) 371
servers (213) 213
keyword search (156) 156
privacy (154) 154
indexes (150) 150
computer science, information systems (148) 148
schlüsselwort (104) 104
verschlüsselung (103) 103
searchable symmetric encryption (92) 92
cloud storage (91) 91
security (91) 91
searching (86) 86
telecommunications (84) 84
engineering, electrical & electronic (83) 83
server (83) 83
symmetrische verschlüsselung (69) 69
access control (68) 68
computer science, theory & methods (67) 67
cryptography (64) 64
public-key encryption (63) 63
public key (60) 60
computer science (56) 56
data privacy (54) 54
data encryption (53) 53
computer science, software engineering (50) 50
cloud-storage (48) 48
data storage (48) 48
secure (45) 45
analysis (44) 44
attribute-based encryption (41) 41
computer security (41) 41
data security (38) 38
outsourcing (38) 38
databases (33) 33
keywords (33) 33
cloud security (32) 32
computer science, hardware & architecture (31) 31
efficient (31) 31
scheme (30) 30
algorithms (29) 29
computer information security (29) 29
besitzer (28) 28
ranked search (28) 28
computation (27) 27
identity-based encryption (26) 26
homomorphic encryption (25) 25
protocols (23) 23
bloom filter (22) 22
cloud-computing (22) 22
computer communication networks (22) 22
sicherheitsanalyse (22) 22
data retrieval (21) 21
privacy preserving (21) 21
symmetric searchable encryption (21) 21
cloud (20) 20
gewährleistung (20) 20
queries (20) 20
engineering (19) 19
keyword guessing attack (19) 19
keyword ranked search (19) 19
receivers (19) 19
computer science, interdisciplinary applications (18) 18
data search (18) 18
electronic mail (18) 18
entschlüsselung (18) 18
privacy-preserving (18) 18
public key encryption with keyword search (18) 18
zugriffskontrolle (18) 18
検索 (18) 18
data sharing (17) 17
datenspeicherung (17) 17
geheimhaltung (17) 17
provable security (17) 17
search problems (17) 17
authorization (16) 16
communications engineering, networks (16) 16
information storage and retrieval (16) 16
keyword guessing attacks (16) 16
multi-keyword (16) 16
proxy re-encryption (16) 16
query processing (16) 16
検索可能暗号 (16) 16
authentication (15) 15
conjunctive keyword search (15) 15
data outsourcing (15) 15
methods (15) 15
semantics (15) 15
情報 (15) 15
blockchain (14) 14
conferences (14) 14
encrypted data (14) 14
information retrieval (14) 14
internet of things (14) 14
multi-keyword ranked search (14) 14
semantic search (14) 14
vectors (14) 14
attribute based encryption (13) 13
forward privacy (13) 13
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Proceedings of the 2012 ACM conference on computer and communications security, ISSN 1543-7221, 10/2012, pp. 965 - 976
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of... 
searchable symmetric encryption | cloud storage | cloud computing | Cloud computing | Cloud storage | Searchable symmetric encryption
Conference Proceeding
ACM Computing Surveys (CSUR), ISSN 0360-0300, 08/2017, Volume 50, Issue 3, pp. 1 - 37
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread... 
cloud security | privacy-preserving search | Searchable encryption | computing in the encrypted domain | Cloud security | Computing in the encrypted domain | Privacy-preserving search | Surveys | Privacy | Cloud computing
Journal Article
Information Sciences, ISSN 0020-0255, 07/2018, Volume 453, pp. 364 - 378
We put forward a new cryptographic primitive called (WBSE), namely if and satisfy a witness relation, an encryption of ( ) could be tested by a trapdoor of (... 
Keyword guessing attack | Witness relation | Smooth projective hash function | Searchable encryption | PUBLIC-KEY ENCRYPTION | KEYWORD GUESSING ATTACKS | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | RANDOM ORACLE | SCHEMES | Computer science
Journal Article
Information Sciences, ISSN 0020-0255, 09/2017, Volume 402, pp. 233 - 243
In the recent years, Searchable Symmetric Encryption (SSE) has become one of the hottest topic in cloud-computing area because of its availability and... 
Searchable symmetric encryption | Deniable encryption | Coercer | Cloud-computing | COMPUTER SCIENCE, INFORMATION SYSTEMS | Computer science | Systems and data security software | Algorithms | Analysis
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 05/2018, Volume 15, Issue 3, pp. 496 - 510
Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in... 
similarity search | proximity search | homomorphic encryption | Cloud storage | Encryption | Indexes | Servers | Multimedia communication | searchable encryption | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | RETRIEVAL
Journal Article
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2015, Volume 2015-, pp. 668 - 679
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing... 
searchable encryption | vulnerabilities | leakage | Leakage | Searchable encryption
Conference Proceeding
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2019, Volume 14, Issue 3, pp. 789 - 802
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted data stored on a remote server. Researchers have... 
Privacy | leakage of file-access pattern | Upper bound | Databases | search query privacy | Encryption | Electronic mail | Searchable symmetric encryption | Servers | passive attacks | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Leakage | Queries | Keywords | Upper bounds | Recovery
Journal Article
Information Sciences, ISSN 0020-0255, 12/2016, Volume 373, pp. 419 - 440
Public key encryption with equality test (PKEET), which was first introduced by Yang et al. (CT-RSA, 2010), has various applications including facilitating... 
Identity-based encryption | Equality test | Random oracle model | Public key encryption | SEARCHABLE ENCRYPTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | AUTHORIZATION | Hardness | Equality | Medical records | Cloud computing | Partitioning | Searching | Construction methods | Encryption | Internet | Security
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 08/2016, Volume 65, Issue 8, pp. 2374 - 2385
The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data... 
Cloud computing | Aggregates | Keyword search | cloud storage | data privacy | Encryption | Servers | data sharing | Searchable encryption | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | ENGINEERING, ELECTRICAL & ELECTRONIC | Cryptography | Research | Network security | Searching | Data storage | Data retrieval | Stores | Computer information security | Flexibility
Journal Article
Journal of Computer Security, ISSN 0926-227X, 2011, Volume 19, Issue 5, pp. 895 - 934
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 7859, pp. 258 - 274
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7397, pp. 285 - 298
Conference Proceeding
by Ma, Sha
Information Sciences, ISSN 0020-0255, 01/2016, Volume 328, pp. 389 - 402
We firstly combine the concepts of public key encryption with equality test (PKEET) and identity-based encryption (IBE) to obtain identity-based encryption... 
Identity-based encryption | Equality test | Public key encryption | Searchable encryption | PUBLIC-KEY ENCRYPTION | SCHEME | KEYWORD GUESSING ATTACKS | SEARCH | CONSTRUCTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | AUTHORIZATION | Cloud computing | Algorithms | Outsourcing | Equality | Messages | Email | Receivers | Management | Encryption | Servers | Computer information security
Journal Article
Proceedings of the 2018 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 01/2018, pp. 763 - 780
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition... 
backward security | puncturable encryption | symmetric searchable encryption | Backward Security | Puncturable Encryption | Symmetric Searchable Encryption
Conference Proceeding
Information Sciences, ISSN 0020-0255, 05/2014, Volume 265, pp. 176 - 188
Searching on remote encrypted data (commonly known as ) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted... 
Cloud computing | Grouping-based construction | Search pattern | Fake query | Searchable encryption | PUBLIC-KEY ENCRYPTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | KEYWORD SEARCH | Outsourcing
Journal Article
Proceedings of the 2014 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 11/2014, pp. 310 - 320
Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud storage where a client... 
update | searchable encryption | dynamic searchable encryption | secure index | Dynamic searchable encryption | Secure index | Update | Searchable encryption
Conference Proceeding
Future Generation Computer Systems, ISSN 0167-739X, 01/2018, Volume 78, pp. 778 - 788
In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional... 
Verifiable keyword search | Data sharing | Cloud storage | Searchable encryption | PRIVACY | CLOUD | SECURITY | COMPUTER SCIENCE, THEORY & METHODS | COMPUTATION | Computer science | Control engineering | Usage | Analysis
Journal Article
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, ISSN 0916-8508, 01/2019, Volume E102A, Issue 1, pp. 114 - 124
In the model of no-dictionary searchable symmetric encryption (SSE) schemes, the client does not need to keep the list of keywords W. In this paper, we first... 
Verifiable | Dictionary | Search pattern | Searchable symmetric encryption | searchable symmetric encryption | verifiable | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | dictionary | search pattern | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | KEYWORD SEARCHES | ENGINEERING, ELECTRICAL & ELECTRONIC | Dictionaries | Encryption
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2015, Volume 10, Issue 3, pp. 458 - 470
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.