A secure two-party Euclidean distance computation scheme through a covert adversarial model based on Paillier encryption
L Su, H Geng, S Guo, S He - IEEE Access, 2023 - ieeexplore.ieee.org
Existing secure two-party Euclidean distance computation schemes are mostly performed
based on a semi-honest model, which faces bottlenecks in computation efficiency and …
based on a semi-honest model, which faces bottlenecks in computation efficiency and …
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy‐Preserving Protocol to Mitigate Digital Traces
Web search querying is an inevitable activity of any Internet user. The web search engine
(WSE) is the easiest way to search and retrieve data from the Internet. The WSE stores the …
(WSE) is the easiest way to search and retrieve data from the Internet. The WSE stores the …
On the self-adjustment of privacy safeguards for query log streams
Internet-based services process and store numerous search queries around the globe. The
use of web search engines, such as Bing and Google, as well as personal assistants (eg …
use of web search engines, such as Bing and Google, as well as personal assistants (eg …
Taming the round efficiency of cryptographic protocols for private web search schemes
M Kim, IJ Lee - Information Sciences, 2023 - Elsevier
Private web search (PWS) schemes allow users to find information on the internet while
preserving their privacy. Among them, cryptographic PWS schemes guarantee strong …
preserving their privacy. Among them, cryptographic PWS schemes guarantee strong …
Proxy-terms based query obfuscation technique for private web search
Search engines store users' queries in a query log for performing personalized information
retrieval. However, query logs cause privacy concerns and reveal a lot of information about …
retrieval. However, query logs cause privacy concerns and reveal a lot of information about …
Web User Profile Generation and Discovery Analysis using LSTM Architecture
In today's technology-driven world, a user profile is a virtual representation of each user,
containing various user information such as personal, interest and preference data. These …
containing various user information such as personal, interest and preference data. These …
State of the Art in Distributed Privacy-Preserving Protocols in Private Web Search
Web search engine (WSE) is an inevitable software system used by people worldwide to
retrieve data from the web by using keywords called queries. WSE stores search queries to …
retrieve data from the web by using keywords called queries. WSE stores search queries to …
A Survey on Performance Evaluation Mechanisms for Privacy-Aware Web Search Schemes
Due to the exponential growth of information on the internet, web search engines (WSEs)
have become indispensable for effectively retrieving information. Web search engines store …
have become indispensable for effectively retrieving information. Web search engines store …
Cyber Sentinel: A Triadic Defense Protocol for Seamless Transaction Security
S Muthusundari, S Dhilip… - 2024 4th International …, 2024 - ieeexplore.ieee.org
" CYBER SENTINEL: A TRIADIC DEFENSE PROTOCOL FOR SEAMLESS TRANSACTION
SECURITY" is a web application that provides three layers of security to E-commerce …
SECURITY" is a web application that provides three layers of security to E-commerce …
Web Search Privacy Evaluation Metrics
RU Khan, M Ullah, B Shafi - Protecting User Privacy in Web Search …, 2023 - igi-global.com
Privacy quantification methods are used to quantify the knowledge the adverse search
engine has obtained with and without privacy protection mechanisms. Thus, these methods …
engine has obtained with and without privacy protection mechanisms. Thus, these methods …