The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice
encrypted data when a majority of research is limited to exact-keyword-search only. We propose a novel scheme for proximity-based-search on encrypted databases hosted in untrusted service environments. This scheme involves a trusted proxy which facilitates a trapdoor to execute search queries over encrypted data while
Keyword search is a wildly popular way for querying XML document. However, the increasing volume of XML data poses new challenges to keyword search processing. Parallel database is an efficient solution for this problem. In this paper, we study the problem of effective keyword search for SLCA (Smallest lower common
authorized ones. In this paper, we propose a novel searchable encryption scheme, named PEKS-PM, based on pseudo inverse matrix, which enables a trusted party to give the service provider's server the ability to test whether a given keyword appears in log records but the server learns nothing about the keyword and the log
concept of this paper is XML technologies. In this paper, we propose a novel system called CSR (Clustering Search Results) which extracts the data from the XML database and clusters them based on the similarity and finally assigns meaningful label for it. So, the output of the keyword entered will be the clusters containing
patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of
hinder the extension of OpenEHR coverage to more domains and countries. To solve the above open problems, in this paper, we explore two approaches which guarantee the security and flexibility of sharing EHR on the cloud and thus propose a new architecture called Crypt-EHRServer. Firstly, we use attribute-based encryption to
In this paper different searchable encryption techniques are studied along with some implementation of searchable encryption in a cloud environment. Symmetric searchable encryption is implemented through trapdoor function to selectively expose keyword for search. A new method of achieving searchable encryption in the
This paper proposes a new double-private protocol for fuzzy matching and $\epsilon$-fuzzy matching. Many works have been done for private database search in which the keyword that a user inputs for the search is concealed to the database owner. In these database searches, the exactly matched data are returned
to create a new entry in a database from the Neurology Laboratory measurements. The advantage of the web application is to view patient's saved records, filter entries with by keywords, show a preview of a curve and download electro physical data in three different formats (edf, dat, xml). The output of the proposed
In this paper, we describe a new primitive for error-tolerant searchable encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.