Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues
Emerging technologies are playing a critical role in the evolution of healthcare systems by
presenting eHealth to provide high-quality services and better health to wide-range of …
presenting eHealth to provide high-quality services and better health to wide-range of …
A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …
current cloud computing scenario. The majority of the existing techniques are focusing on …
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption
The goal of searchable encryption (SE) is to enable a client to execute searches over
encrypted files stored on an untrusted server while ensuring some measure of privacy for …
encrypted files stored on an untrusted server while ensuring some measure of privacy for …
The body in the cave
R Peterson - Neolithic cave burials, 2019 - manchesterhive.com
2 Neolithic cave burials particularly relevant and useful in trying to interpret the archaeology
of Neolithic cave burial in Britain. It is not a complete review of the many different …
of Neolithic cave burial in Britain. It is not a complete review of the many different …
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …
to the cloud by data owners motivated to access the large-scale computing resources and …
New constructions for forward and backward private symmetric searchable encryption
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …