Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 246 matches
- 2024
- Somchart Fugkeaw, Lyhour Hak, Thanaruk Theeramunkong:
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse. IEEE Access 12: 49848-49864 (2024) - Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(1): 353-371 (2024) - Ningning Cui, Dong Wang, Jianxin Li, Huaijie Zhu, Xiaochun Yang, Jianliang Xu, Jie Cui, Hong Zhong:
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains. IEEE Trans. Knowl. Data Eng. 36(6): 2445-2460 (2024) - Yinbin Miao, Feng Li, Xinghua Li, Zhiquan Liu, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud. IEEE Trans. Mob. Comput. 23(5): 3650-3665 (2024) - 2023
- Vahid Yousefipoor, Taraneh Eghlidos:
An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data. Comput. Electr. Eng. 105: 108523 (2023) - Je-Kuan Lin, Wun-Ting Lin, Ja-Ling Wu:
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes. Cryptogr. 7(2): 28 (2023) - Youming Ge, Zitong Chen, Yubao Liu:
An Efficient Keywords Search in Temporal Social Networks. Data Sci. Eng. 8(4): 368-384 (2023) - Xia Wu, Yingbo Liu, Xiaoming Zhao, Jingsi Chen:
STKST-I: An Efficient Semantic Trajectory Search by Temporal and Semantic Keywords. Expert Syst. Appl. 225: 120064 (2023) - Chang-Sup Park:
Efficient keyword search on graph data for finding diverse and relevant answers. Int. J. Web Inf. Syst. 19(1): 19-41 (2023) - Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:
Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing. J. Inf. Secur. Appl. 75: 103500 (2023) - Ziyang Han, Qingqing Ye, Haibo Hu:
OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol. J. Comput. Secur. 31(2): 129-152 (2023) - Qiong Huang, Peisen Huang, Hongbo Li, Jianye Huang, Hongyuan Lin:
A more efficient public-key authenticated encryption scheme with keyword search. J. Syst. Archit. 137: 102839 (2023) - Chang Xu, Ruijuan Wang, Liehuang Zhu, Chuan Zhang, Rongxing Lu, Kashif Sharif:
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data. IEEE Trans. Big Data 9(3): 805-817 (2023) - Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. IEEE Trans. Cloud Comput. 11(1): 25-43 (2023) - Lingyun Cao, Xiang Li:
Privacy-Enhanced Dynamic Symmetric Searchable Encryption with Efficient Searches Under Sparse Keywords. ICA3PP (6) 2023: 93-113 - 2022
- Lingbing Tao, Hui Xu, Ying Shu, Zhixin Tie:
An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data. IEEE Access 10: 42836-42843 (2022) - Sajjad Palanki, Alireza Shafieinejad:
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage. ISC Int. J. Inf. Secur. 14(3): 135-149 (2022) - Rong Yang, Baoning Niu, Pengfei Jin:
An efficient approach for searching optimal multi-keywords coverage routes. J. Comb. Optim. 44(2): 1104-1133 (2022) - Hui Yin, Yangfan Li, Fangmin Li, Hua Deng, Wei Zhang, Keqin Li:
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT. J. Syst. Archit. 128: 102533 (2022) - Sangeetha Dhamodaran, S. Sibi Chakkaravarthy, Suresh Chandra Satapathy, Vaidehi V., Meenalosini Vimal Cruz:
Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud. Multim. Tools Appl. 81(16): 22065-22085 (2022) - Wanshan Xu, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, Muhammad Irfan Khalid:
Towards efficient verifiable multi-keyword search over encrypted data based on blockchain. PeerJ Comput. Sci. 8: e930 (2022) - Chaoyang Li, Mianxiong Dong, Jian Li, Gang Xu, Xiu-Bo Chen, Wen Liu, Kaoru Ota:
Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain. IEEE Syst. J. 16(4): 5521-5532 (2022) - Yangyang Bao, Weidong Qiu, Peng Tang, Xiaochun Cheng:
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Informatics 26(5): 2041-2051 (2022) - Keita Emura:
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. APKC@AsiaCCS 2022: 39-49 - Meixia Miao, Panru Wu, Yunling Wang:
Multi-user Verifiable Database with Efficient Keyword Search. CSS 2022: 133-146 - Heng He, Jiaqi Liu, Jinguang Gu, Feng Gao:
An Efficient Multi-Keyword Search Scheme over Encrypted Data in Multi-Cloud Environment. SmartCloud 2022: 59-67 - Yingrui Yang, Yifan Qiao, Jinjin Shao, Xifeng Yan, Tao Yang:
Lightweight Composite Re-Ranking for Efficient Keyword Search with BERT. WSDM 2022: 1234-1244 - Chang Xu, Ruijuan Wang, Liehuang Zhu, Chuan Zhang, Rongxing Lu, Kashif Sharif:
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data. CoRR abs/2203.13662 (2022) - Keita Emura:
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. IACR Cryptol. ePrint Arch. 2022: 72 (2022) - 2021
- Lidong Han, Junling Guo, Guang Yang, Qi Xie, Chengliang Tian:
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time. IEEE Access 9: 151245-151253 (2021)
skipping 216 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-11 20:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint