Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues

M Sookhak, MR Jabbarpour, NS Safa, FR Yu - Journal of Network and …, 2021 - Elsevier
Emerging technologies are playing a critical role in the evolution of healthcare systems by
presenting eHealth to provide high-quality services and better health to wide-range of …

A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement

Z Fu, X Wu, C Guan, X Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …

All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption

Y Zhang, J Katz, C Papamanthou - 25th USENIX Security Symposium …, 2016 - usenix.org
The goal of searchable encryption (SE) is to enable a client to execute searches over
encrypted files stored on an untrusted server while ensuring some measure of privacy for …

The body in the cave

R Peterson - Neolithic cave burials, 2019 - manchesterhive.com
2 Neolithic cave burials particularly relevant and useful in trying to interpret the archaeology
of Neolithic cave burial in Britain. It is not a complete review of the many different …

Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing

Z Fu, X Sun, Q Liu, L Zhou, J Shu - IEICE Transactions on …, 2015 - search.ieice.org
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …

New constructions for forward and backward private symmetric searchable encryption

J Ghareh Chamani, D Papadopoulos… - Proceedings of the …, 2018 - dl.acm.org
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …