A secure and efficient ECC-based scheme for edge computing and internet of things

H AlMajed, A AlMogren - Sensors, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) has raised security concerns over the
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …

Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications

C Chen, F Zheng, J Cui, Y Cao, G Liu, J Wu… - International Journal of …, 2024 - Springer
Abstract Knowledge Graph (KG) has attracted more and more companies' attention for its
ability to connect different types of data in meaningful ways and support rich data services …

SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography

HN Almajed, AS Almogren - IEEE Access, 2019 - ieeexplore.ieee.org
Many applications use asymmetric cryptography to secure communications between two
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …

Frequency-hiding order-preserving encryption with small client storage

D Li, S Lv, Y Huang, Y Liu, T Li, Z Liu… - Proceedings of the VLDB …, 2021 - dl.acm.org
The range query on encrypted databases is usually implemented using the order-preserving
encryption (OPE) technique which preserves the order of plaintexts. Since the frequency …

加密文档排序中保序加密算法的最优化选取

张久岭, 黄道超, 沈时军 - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
对需要存储在服务器端的用户文档进行加密是对用户隐私保护的根本方法. 采用不同的保序加密
算法对加密文档排序结果有着不同的影响, 寻找排序结果最优的保序加密算法是亟待解决的问题 …

Random Perturbation Order Preserving Distribution Encryption

MA Kamara, X Li - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud computing services have to gain fast awareness by many organizations because of
their cost-effectiveness, but they are faced with many security issues in protecting client …

A review of order preserving encryption schemes

MA Kamara, X Li - The International Conference on Natural Computation …, 2020 - Springer
Cloud computing and Database as a service have gaining rapid interest by many
organizations today because of its cost effectiveness but it faced a lot of security issued in …

[PDF][PDF] Highly-Scalable Protected Graph Database Search with Oblivious Filter.

J Cui, C Chen, L Wang - IACR Cryptol. ePrint Arch., 2020 - iacr.steepath.eu
With the emerging popularity of cloud computing, the problem of how to query over
cryptographically-protected data has been widely studied. However, most existing works …

Securing Data in Internet of Things (IoT) Using Elliptic Curve Cryptography

NP Hegde, P Deepthi - International Conference on Communications and …, 2023 - Springer
The data everywhere was being transferred for each second using domain of Internet of
Things (IoT). To secure data using the Internet of Things (IoT) is a tedious task. When the …

Anti-leakage mutable order preserving distribution encoding

MA Kamara, X Li - The International Conference on Natural Computation …, 2020 - Springer
Over the years, a lot of studied have been conducted on Order Preserving Encryption (OPE)
schemes because of its possible application to database design. Unfortunately, few …