The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using the same key for both encryption as well as decryption is the key principle in symmetric algorithm. This mechanism involves the existence of centralized Key Distribution Centre also known as KDC, responsible for distributing and maintaining attributes and secret keys to its users. There also is a decentralized access control scheme used to make data storage in clouds more secure. The security...
Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword
-efficiency and privacy. Three secure search protocols, namely Ostrovsky protocol, COPS protocol and EIRQ protocol are discussed in this paper. Each of these protocols incrementally improves upon the basic keyword search. Ostrovsky protocol offers privacy. COPS protocol aggregates the search results and achieves cost efficiency
scheme, which allows users to perform an encrypted keyword search on encrypted data stored in database server directly without decrypting it. In many applications, it requires to access the database by multiple users where data is written by different users using different encryption keys. In this paper, we propose schemes
Conventional cryptosystems are supposed to be used for the personal communication. However, the secure and effective communication system is more and more required for inter-organization cryptosystem. From a practical point of view, it is not necessary to decide the person in charge from the keywords when the sender
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.