Výsledky vyhledávání - "Encrypted Database"
-
1
Autoři: a další
Zdroj: CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
Popis souboru: application/application/pdf
Přístupová URL adresa: http://hdl.handle.net/20.500.11850/682991
-
2
Autoři:
Zdroj: Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Témata: Encrypted database, Frequency-smoothing encryption, Inference attacks, Applied cryptography, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: https://doaj.org/toc/2523-3246
Přístupová URL adresa: https://doaj.org/article/acd2a02831c14d2da1ab247c4f305224
-
3
Autoři: a další
Zdroj: CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
Popis souboru: application/application/pdf
Relation: info:eu-repo/semantics/altIdentifier/isbn/979-8-4007-0636-3; info:eu-repo/semantics/altIdentifier/wos/001436367300275; http://hdl.handle.net/20.500.11850/682991
-
4
Autoři: a další
Zdroj: Applied Sciences, Vol 14, Iss 2, p 835 (2024)
Témata: secure protocol, privacy-preserving k-Means clustering algorithm, encrypted database, database outsourcing, cloud computing, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/14/2/835; https://doaj.org/toc/2076-3417; https://doaj.org/article/23a069f002164e948369f23ced1f7b4c
-
5
Autoři: a další
Zdroj: IEEE Access, Vol 9, Pp 30124-30134 (2021)
Témata: efficiency, IND-OCPA security, 0202 electrical engineering, electronic engineering, information engineering, Order-preserving encryption/encoding, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, encrypted database system, TK1-9971
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/9312710/09350588.pdf
https://doaj.org/article/55288c6dc09a40f382013f41f7df93e0
https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202102269153035558
https://doi.org/10.1109/ACCESS.2021.3058186
https://ieeexplore.ieee.org/document/9350588/
https://dblp.uni-trier.de/db/journals/access/access9.html#ChenLZCH21 -
6
Autoři: a další
Témata: Encrypted Database, Order Revealing Encryption, Property Preserving Encryption, Secure Indexes
Popis souboru: application/pdf
Přístupová URL adresa: https://hdl.handle.net/11380/1322646
-
7
Autoři: a další
Přispěvatelé: a další
Zdroj: IEEE Access, Vol 7, Pp 161283-161295 (2019)
Témata: Mathematics [Science], Encrypted database, private queries, homomorphic encryption, 0202 electrical engineering, electronic engineering, information engineering, Encrypted Database, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, Private Queries, TK1-9971, 3. Good health
Popis souboru: application/pdf
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/8600701/08891605.pdf
https://doaj.org/article/a284e7ed37aa4eb599a18787d00c53ee
https://dblp.uni-trier.de/db/journals/access/access7.html#KimLLRTW19
https://doi.org/10.1109/ACCESS.2019.2951695
https://dr.ntu.edu.sg/handle/10356/138019
https://doaj.org/article/a284e7ed37aa4eb599a18787d00c53ee
https://oar.a-star.edu.sg/jspui/bitstream/123456789/3153/2/CH_PDQ_Access_Final_V2.pdf
http://doi.org/10.1109/ACCESS.2019.2951695
https://hdl.handle.net/10356/138019 -
8
ANEW TECHNIQUE BY USING INVERTED TABLES AND 3D BOX FOR EFFICIENT QUERYING OVER AN ENCRYPTED DATABASE
Autoři:
Zdroj: Iraqi Journal for Computers and Informatics, Vol 46, Iss 2, Pp 1-5 (2020)
Přístupová URL adresa: https://doaj.org/article/13151375e12e41a4af7051096ffc906a
-
9
Autoři: a další
Zdroj: Research Collection School Of Computing and Information Systems
Témata: Dynamic encrypted database, information leakage, range query, update recovery attacks, Information Security
Popis souboru: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/5998; https://ink.library.smu.edu.sg/context/sis_research/article/7001/viewcontent/Update_recovery_attacks_on_encrypted_database_2020_av.pdf
-
10
Autoři: a další
Zdroj: Electronics, Vol 11, Iss 2870, p 2870 (2022)
Témata: secure protocol, privacy-preserving Top- k query processing algorithm, encrypted database, database outsourcing, cloud computing, Electronics, TK7800-8360
Relation: https://www.mdpi.com/2079-9292/11/18/2870; https://doaj.org/toc/2079-9292; https://doaj.org/article/ccd6cc0436ba49a29389ea6b2c3e815c
-
11
Autoři: a další
Přispěvatelé: a další
Zdroj: Ad Hoc Networks. 158:103478
Témata: IoT, privacy, encrypted database, revocation, keyword search
-
12
Autoři:
Zdroj: IEICE Transactions on Information and Systems. 2022, E105.D(11):1930
-
13
Autoři: a další
Přispěvatelé: a další
Témata: IoT, privacy, keyword search, encrypted database, revocation
Relation: Ad Hoc Networks Vol. 158, Issue 1 May 2024, no. 103478; http://hdl.handle.net/1959.13/1501191; uon:55093
Dostupnost: http://hdl.handle.net/1959.13/1501191
-
14
Autoři: a další
Relation: https://zenodo.org/records/2594535; oai:zenodo.org:2594535; https://doi.org/10.1145/3243734.3243864
-
15
Autoři:
Relation: https://zenodo.org/communities/eu/; https://zenodo.org/records/2594602; oai:zenodo.org:2594602; https://doi.org/10.1109/SP.2018.00002
-
16
Autoři: Filipp B. Burtyka
Zdroj: Безопасность информационных технологий, Vol 24, Iss 2, Pp 24-34 (2017)
Témata: Private Queries, Encrypted Database, Fully Homomorphic Encryption, Secure Computations, Secret Computations, Untrusted Environment, Cryptographic Protocol, Private Information Retrieval, Querying Encrypted Data, Information technology, T58.5-58.64, Information theory, Q350-390
Popis souboru: electronic resource
Relation: https://bit.mephi.ru/index.php/bit/article/view/102; https://doaj.org/toc/2074-7128; https://doaj.org/toc/2074-7136
Přístupová URL adresa: https://doaj.org/article/89a23069c7b24599ae088c3f7e879820
-
17
Kriptiranje podataka s očuvanjem redoslijeda zasnovano na intervalnim markerima s izravnim pristupom
Autoři:
Přispěvatelé:
Témata: interval markers, OPE shema, order preserving encryption, TECHNICAL SCIENCES. Computing, kriptiranje s očuvanjem redoslijeda, TEHNIČKE ZNANOSTI. Računarstvo, OPE schema, kriptirana baza podataka, encrypted database, intervalni markeri
Popis souboru: application/pdf
-
18
Autoři: a další
Přispěvatelé: a další
Zdroj: Lecture Notes in Computer Science ; 27th Data and Applications Security and Privacy (DBSec) ; https://inria.hal.science/hal-01490705 ; 27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.195-210, ⟨10.1007/978-3-642-39256-6_13⟩
Geografické téma: Newark, NJ, United States
-
19
Autoři: a další
Témata: Encrypted Database, CryptDB, Onion Schema, Layered Encryption, Database Security, Query Processing, Proxy, Cryptographic Systems
Relation: Journal of Management Information and Decision Sciences; https://bspace.buid.ac.ae/handle/1234/3002
Dostupnost: https://bspace.buid.ac.ae/handle/1234/3002
-
20
Autoři: a další
Zdroj: 医療情報学 / Japan Journal of Medical Informatics. 2017, 37(2):69
Nájsť tento článok vo Web of Science
Full Text Finder