Browse Items (3 total)

  • Tags: Public key

Cloud computing technologies rely on powerful storage services to maintain massive data for users. Sensitive data are encrypted before outsourcing, but this limits the availability of data. Public-key encryption with keyword search (PEKS) contributes…

Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide massive data storage services. To ensure the confidentiality, sensitive industrial data need to be encrypted before being outsourced to cloud storage server.…

Cloud computing technologies rely on powerful storage services to maintain massive data for users. Sensitive data are encrypted before outsourcing, but this limits the availability of data. Public-key encryption with keyword search (PEKS) contributes…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2