Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing
Cloud-based data sharing has become a significant technology trend thanks for its
convenience and economy. Data owners are suggested to encrypt data before outsourcing …
convenience and economy. Data owners are suggested to encrypt data before outsourcing …
Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment
Tensors are popular and versatile tools which model multidimensional data. Tensor
decomposition has emerged as a powerful technique dealing with multidimensional data …
decomposition has emerged as a powerful technique dealing with multidimensional data …
Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system
Y Bao, W Qiu, P Tang, X Cheng - IEEE Journal of Biomedical …, 2021 - ieeexplore.ieee.org
The cloud-assisted medical Internet of Things (MIoT) has played a revolutionary role in
promoting the quality of public medical services. However, the practical deployment of cloud …
promoting the quality of public medical services. However, the practical deployment of cloud …
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
How to use efficient search mechanisms to realize data sharing while ensuring data security
has become an important research topic at present. In this paper, we propose a new …
has become an important research topic at present. In this paper, we propose a new …
Share your data carefree: An efficient, scalable and privacy-preserving data sharing service in cloud computing
Benefiting from the powerful computing and storage capabilities of cloud services, data
sharing in the cloud has been permeated across various applications including social …
sharing in the cloud has been permeated across various applications including social …
Enabling traceable and verifiable multi-user forward secure searchable encryption in hybrid cloud
Forward secure searchable encryption (FSSE) scheme allows one data user to search on
encrypted databases while resisting the file injection attack. The data utilization can be …
encrypted databases while resisting the file injection attack. The data utilization can be …
Str-abks: Server-aided traceable and revocable attribute-based encryption with keyword search
F Meng, L Cheng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive
achieving search functionality and access control for the encrypted data outsourced to the …
achieving search functionality and access control for the encrypted data outsourced to the …
Privacy-preserving spatio-temporal keyword search for outsourced location-based services
Q Huang, J Du, G Yan, Y Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the popularization of location-based services (LBS), encryption techniques have been
utilized to protect data security when outsourcing LBS to cloud. However, existing schemes …
utilized to protect data security when outsourcing LBS to cloud. However, existing schemes …
Outsourcing LDA-based face recognition to an untrusted cloud
Face recognition has been extensively employed in practice, such as attendance system
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing
Q Huang, G Yan, Q Wei - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Attribute-based keyword search (ABKS) has been proposed to realize fine-grained access
control and provide search service in cloud computing. However, most ABKS schemes focus …
control and provide search service in cloud computing. However, most ABKS schemes focus …