Showing 1,261 - 1,280 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1261
  2. 1262
  3. 1263
  4. 1264
  5. 1265
  6. 1266

    Secure efficient and verifiable large linear equations solve outsourcing computing scheme by Xing-lan ZHANG, Xiang LIU

    Published 2017-06-01
    “…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
    Get full text
    Article
  7. 1267

    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security by Shaomin Zhu, Zhiqiang Zhang

    Published 2013-11-01
    “…Therefore, how to realize digital media security effectively is becoming a challenging problem. …”
    Get full text
    Article
  8. 1268

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  9. 1269
  10. 1270
  11. 1271
  12. 1272
  13. 1273
  14. 1274
  15. 1275
  16. 1276

    Efficient and secure multi-user outsourced image retrieval scheme with access control by Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU

    Published 2021-10-01
    “…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
    Get full text
    Article
  17. 1277
  18. 1278

    The Effect of HIV/AIDS Scourge on Food Security in Nyabbani Subcounty, Kitagwenda District. by Ainembabazi, Docus

    Published 2023
    “…The purpose of this research was to assess, analyze, find out, and gather the effect of HIV/AIDS scourge on food security in Nyabbani sub-county, Kitagwenda district.…”
    Get full text
    Thesis
  19. 1279
  20. 1280