Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …
medical records (EMRs) are widely applied in hospital information systems. However …
Data security and privacy in cloud computing: concepts and emerging trends
Millions of users across the world leverages data processing and sharing benefits from
cloud environment. Data security and privacy are inevitable requirement of cloud …
cloud environment. Data security and privacy are inevitable requirement of cloud …
Certificateless public key authenticated encryption with keyword search for industrial internet of things
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile
devices, and communication technologies to enable the upgrade of traditional industries to …
devices, and communication technologies to enable the upgrade of traditional industries to …
Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud
Electronic health (e-health) systems may outsource data such as patient e-health records to
mobile cloud servers for efficiency gains (eg, minimizing local storage and computation …
mobile cloud servers for efficiency gains (eg, minimizing local storage and computation …
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide
massive data storage services. To ensure the confidentiality, sensitive industrial data need …
massive data storage services. To ensure the confidentiality, sensitive industrial data need …
Public-key authenticated encryption with keyword search revisited: Security model and constructions
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the
interesting and challenging problem of searching on encrypted data. However, previous …
interesting and challenging problem of searching on encrypted data. However, previous …
Multi-authority attribute-based keyword search over encrypted cloud data
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices
Y Lu, J Li - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
Cloud storage services have grown extensively in recent years. For security and privacy
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …
an important and practical problem. Public key encryption with keyword search (PEKS) is an …