Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
The Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that is encrypted using a public key setting. Recently, Back et al. proposed a Secure Channel Free Public Key Encryption with Keyword Search (SC...
| Main Authors: | Wei-Chuen, Yau, Swee-Huay, Heng, Bok-Min, Goi |
|---|---|
| Format: | Article |
| Published: |
SPRINGER-VERLAG BERLIN
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2786/ |
Similar Items
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Throw & throws keyword
by: Khowaja, Kamran, et al.
Published: (2011)
by: Khowaja, Kamran, et al.
Published: (2011)
More on const keywords
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Static: the multipurpose keyword
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Weight-adjustable ranking for keyword search in
relational satabases
by: Jou, Chichang., et al.
Published: (2018)
by: Jou, Chichang., et al.
Published: (2018)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Ontology based keyword suggestion for image processing domain
by: Ooi, Jessie
Published: (2018)
by: Ooi, Jessie
Published: (2018)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A conceptual IR chatbot framework with automated keywords-base
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
User assisted keyword search on RSS synthesizer for relevant weblogs
by: Teh, Phoey Lee, et al.
Published: (2009)
by: Teh, Phoey Lee, et al.
Published: (2009)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Keyword query processing interface model of ontological natural language manipulation
by: Hasany, Syed Muhammad Noman
Published: (2010)
by: Hasany, Syed Muhammad Noman
Published: (2010)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
A conceptual IR Chatbot framework with automated keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
A conceptual IR chatbot framework with Automated Keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
Learning logic, search and cracking through a number guessing game
by: Mok, Tsui-Qin, et al.
Published: (2018)
by: Mok, Tsui-Qin, et al.
Published: (2018)
Querying ontology using keywords and quantitative restriction phrases
by: Hasany, Norman, et al.
Published: (2010)
by: Hasany, Norman, et al.
Published: (2010)
Keyword indexing and searching tool (KIST): a tool to assist the forensics analysis of whatsapp chat
by: Shahrol Nizam, Syafiqah Hanisah, et al.
Published: (2020)
by: Shahrol Nizam, Syafiqah Hanisah, et al.
Published: (2020)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Drawing guessing game for the elderly
by: Foo, Wai Yip *, et al.
Published: (2017)
by: Foo, Wai Yip *, et al.
Published: (2017)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
The role of policy labels, keywords and framing in transitioning waste policy
by: Silva, A., et al.
Published: (2015)
by: Silva, A., et al.
Published: (2015)
Effective keyword query structuring using NER for XML retrieval
by: Roko, Abubakar, et al.
Published: (2015)
by: Roko, Abubakar, et al.
Published: (2015)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Spelling errors and keywords in born-digital data: a case study using the Teenage Health Freak Corpus
by: Smith, Catherine, et al.
Published: (2014)
by: Smith, Catherine, et al.
Published: (2014)
Examining Scientific Vocabulary: Mapping Controlled Vocabularies and Free Text Keywords
by: White, Hollie
Published: (2013)
by: White, Hollie
Published: (2013)
Corpus stylistics in contemporary English dramas : keywords and semantic fields of delusions
by: Kriangkrai Vathanalaoha,
Published: (2022)
by: Kriangkrai Vathanalaoha,
Published: (2022)
Historicising corpus stylistics: keywords and collocation in William Langland’s Piers Plowman
by: Cordell, Jacqueline
Published: (2019)
by: Cordell, Jacqueline
Published: (2019)
Keyword based profile creation using latent dirichlet allocation, domain dictionary and domain ontology / Nor Adzlan Jamaludin
by: Jamaludin, Nor Adzlan
Published: (2016)
by: Jamaludin, Nor Adzlan
Published: (2016)
Study of keyword extraction techniques for electric double-layer capacitor domain using text similarity indexes: An experimental analysis
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Kawaii discourse: The semantics of a Japanese cultural keyword and its social elaboration
by: Asano-Cavanagh, Yuko
Published: (2017)
by: Asano-Cavanagh, Yuko
Published: (2017)
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
by: Tan, Choon Lin, et al.
Published: (2017)
by: Tan, Choon Lin, et al.
Published: (2017)
Optimizing title and Meta tags based on distribution of keywords; Lexical and semantic approaches
by: Farahmand, Mohammad, et al.
Published: (2011)
by: Farahmand, Mohammad, et al.
Published: (2011)
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
by: Sazaly, Ummu Sulaim
Published: (2012)
by: Sazaly, Ummu Sulaim
Published: (2012)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A keyword analysis of stance and engagement in three-minute thesis (3MT) presentations
by: Yang, Wenhsien
Published: (2020)
by: Yang, Wenhsien
Published: (2020)
Oil bioremediation in the marine environment of Antarctica: a review and bibliometric keyword cluster analysis
by: Zakaria, Nur Nadhirah, et al.
Published: (2021)
by: Zakaria, Nur Nadhirah, et al.
Published: (2021)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Architectural design keywords of inception space / Muhammad Heru Arie Edytia, Zulhadi Sahputra and Mirza
by: Muhammad Heru, Arie Edytia, et al.
Published: (2019)
by: Muhammad Heru, Arie Edytia, et al.
Published: (2019)
Similar Items
-
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015) -
Throw & throws keyword
by: Khowaja, Kamran, et al.
Published: (2011) -
More on const keywords
by: Shah, Asadullah, et al.
Published: (2011) -
Static: the multipurpose keyword
by: Shah, Asadullah, et al.
Published: (2011) -
Weight-adjustable ranking for keyword search in
relational satabases
by: Jou, Chichang., et al.
Published: (2018)