Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead (Englisch)
- Neue Suche nach: Sheng, Qitian
- Neue Suche nach: Wu, Jiaojiao
- Neue Suche nach: Wang, Jianfeng
- Neue Suche nach: Chen, Xiaofeng
- Neue Suche nach: Shen, Jian
- Weitere Informationen zu Shen, Jian:
- https://orcid.org/https://orcid.org/0000-0003-0519-9058
- Neue Suche nach: Susilo, Willy
- Weitere Informationen zu Susilo, Willy:
- https://orcid.org/https://orcid.org/0000-0002-1562-5105
- Neue Suche nach: Sheng, Qitian
- Neue Suche nach: Wu, Jiaojiao
- Neue Suche nach: Wang, Jianfeng
In:
Cyberspace Safety and Security
: 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings
;
Kapitel: 1
;
3-16
;
2022
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Chen, Xiaofeng ( Herausgeber:in ) / Shen, Jian ( Herausgeber:in ) / Susilo, Willy ( Herausgeber:in ) / Sheng, Qitian ( Autor:in ) / Wu, Jiaojiao ( Autor:in ) / Wang, Jianfeng ( Autor:in )
-
Kongress:International Symposium on Cyberspace Safety and Security ; 2022
-
Erschienen in:Cyberspace Safety and Security : 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings ; Kapitel: 1 ; 3-16Lecture Notes in Computer Science ; 13547 ; 3-16
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:29.09.2022
-
Format / Umfang:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification OverheadSheng, Qitian / Wu, Jiaojiao / Wang, Jianfeng et al. | 2022
- 2
-
A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart HealthcareMa, Yuqian / Ma, Yongliu / Liu, Yidan / Cheng, Qingfeng et al. | 2022
- 3
-
Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)Wang, Yong / Xie, Hao / Wang, Ruyi et al. | 2022
- 4
-
A Collaborative Access Control Scheme Based on Incentive MechanismsLi, Yifei / Zhang, Yinghui / Liu, Wei / Ning, Jianting / Zheng, Dong et al. | 2022
- 5
-
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRingBao, Zijian / He, Debiao / Liu, Yulin / Peng, Cong / Feng, Qi / Luo, Min et al. | 2022
- 6
-
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud StorageLiu, Zhenhua / Ma, Yuanju / Niu, Yaxin / Gong, Jingwan / Wang, Baocang et al. | 2022
- 7
-
FDLedger: Dynamic and Efficient Anonymous Audit for Distributed LedgersLiu, Yao / Yuan, Zhonghao / Hu, Yunhan et al. | 2022
- 8
-
A Method of Traceless File Deletion for NTFS File SystemXu, Shujiang / Wang, Fansheng / Wang, Lianhai / Chang, Xu / Yang, Tongfeng / Yang, Weijun et al. | 2022
- 9
-
Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets SettingWei, Lifei / Liu, Jihai / Zhang, Lei / Zhang, Wuji et al. | 2022
- 10
-
Multi-user Verifiable Database with Efficient Keyword SearchMiao, Meixia / Wu, Panru / Wang, Yunling et al. | 2022
- 11
-
A Blockchain-Based Collaborative Auditing Scheme for Cloud StorageXiao, Jie / Huang, Hui / Wu, Chenhuang / Chen, Qunshan / Huang, Zhenjie et al. | 2022
- 12
-
High Quality Audio Adversarial Examples Without Using PsychoacousticsZong, Wei / Chow, Yang-Wai / Susilo, Willy et al. | 2022
- 13
-
Working Mechanism of Eternalblue and Its Application in RansomwormLiu, Zian / Chen, Chao / Zhang, Leo Yu / Gao, Shang et al. | 2022
- 14
-
Substitution Attacks Against Sigma ProtocolsLin, Yuliang / Chen, Rongmao / Wang, Yi / Wang, Baosheng / Liu, Lin et al. | 2022
- 15
-
A Multi-stage APT Attack Detection Method Based on Sample EnhancementXie, Lixia / Li, Xueou / Yang, Hongyu / Zhang, Liang et al. | 2022
- 16
-
VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph TransformerYang, Hongyu / Yang, Haiyun / Zhang, Liang et al. | 2022
- 17
-
Anomalous Network Traffic Detection Based on CK Sketch and Machine LearningChi, Yaping / Xue, Defan / Yue, Ziyan / Wang, Zhiqiang / Jiaming, Liang et al. | 2022
- 18
-
FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense SchemeXu, Mengfan / Li, Xinghua et al. | 2022
- 19
-
Membership Inference Attacks Against Robust Graph Neural NetworkLiu, Zhengyang / Zhang, Xiaoyu / Chen, Chenyang / Lin, Shen / Li, Jingjin et al. | 2022
- 20
-
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on LatticeTian, Haibo / Wen, Yanchuan / Zhang, Fangguo / Shao, Yunfeng / Li, Bingshuai et al. | 2022
- 21
-
A Defect Level Assessment Method Based on Weighted Probability EnsembleXie, Lixia / Liu, Siyu / Yang, Hongyu / Zhang, Liang et al. | 2022
- 22
-
A Decentralized Ride-Hailing Mode Based on Blockchain and Attribute EncryptionZhang, Yifan / Zhou, Yuping / Hu, Yu / Huang, Hui et al. | 2022
- 23
-
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on LatticeZuo, Ruozhou / Tian, Haibo / An, Zhiyuan / Zhang, Fangguo et al. | 2022
- 24
-
Improvised Model for Blockchain in Distributed Cloud EnvironmentGawde, Meeraj Mahendra / Choudhary, Gaurav / Shandilya, Shishir Kumar / Rahman, Rizwan Ur / Park, Hoonyong / You, Ilsun et al. | 2022
- 25
-
Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS ModelLi, Hui / Li, Xuelian / Gao, Juntao / Wang, Runsong et al. | 2022
- 26
-
Design of Anti Machine Learning Malicious Node System Based on BlockchainLiu, Yuanzhen / Yang, Yanbo / Zhang, Jiawei / Li, Baoshan et al. | 2022