期刊文献+
共找到14,099篇文章
< 1 2 250 >
每页显示 20 50 100
Efficient Expressive Attribute-Based Encryption with Keyword Search over Prime-Order Groups
1
作者 Qing Miao Lan Guo +1 位作者 Yang Lu Zhongqi Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2737-2754,共18页
Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It i... Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs. 展开更多
关键词 Searchable encryption expressive keyword search attribute-based encryption unbounded keyword universe prime-order group
下载PDF
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC
2
作者 R.Lakshmana Kumar R.Subramanian S.Karthik 《Journal of Information Hiding and Privacy Protection》 2021年第4期201-226,共26页
Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the clo... Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the cloud for storing and retrieving data since the devices are not capable of storing processing data on its own.Cloud Computing provides various services to the users like the IaaS,PaaS and SaaS.The major drawback that is faced by cloud computing include the Utilization of Cloud services for the storage of data that could be accessed by all the users related to cloud.The use of Public Key Encryptions with keyword search(PEKS)provides security against the untrustworthy third-party search capability on publicly encryption keys without revealing the data’s contents.But the Security concerns of PEKs arise when Inside Keywords Guessing attacks(IKGA),is identified in the system due to the untrusted server presume the keyword in trapdoor.This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search(CL-HPAEKS)which utilizes the Modified Elliptic Curve Cryptography(MECC)along with the Mutation Centred flower pollinations algorithm(CM-FPA)that is used in enhancing the performance of the algorithm using the Optimization in keys.The additional use of Message Digests 5(MD5)hash function in the system enhances the security Level that is associated with the system.The system that is proposed achieves the security level performance of 96 percent and the effort consumed by the algorithm is less compared to the other encryption techniques. 展开更多
关键词 Certificateless Hashed Public Key Authenticated Encryption with keyword Search(CL-HPAEKS) modified elliptic curve cryptography(MECC) digest 5(MD5) inside keywords guessing attacks(IKGA) public key encryptions with keyword search(PEKS)
下载PDF
Keyword Extraction Based on tf/idf for Chinese News Document 被引量:24
3
作者 LI Juanzi FAN Qi'na ZHANG Kuo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期917-921,共5页
Keyword extraction is an important research topic of information retrieval. This paper gave the specification of keywords in Chinese news documents based on analyzing linguistic characteristics of news documents and t... Keyword extraction is an important research topic of information retrieval. This paper gave the specification of keywords in Chinese news documents based on analyzing linguistic characteristics of news documents and then proposed a new keyword extraction method based on tf/idf with multi-strategies. The approach selected candidate keywords of uni-, hi- and tri-grams, and then defines the features according to their morphological characters and context information. Moreover, the paper proposed several strategies to amend the incomplete words gotten from the word segmentation and found unknown potential keywords in news documents. Experimental results show that our proposed method can significantly outperform the baseline method. We also applied it to retrospective event detection. Experimental results show that the accuracy and efficiency of news retrospective event detection can be significantly improved. 展开更多
关键词 keyword extraction keyphrase extraction news keyword
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
4
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 Peer-to-peer (P2P) keyword-set search (KSS) keyword relationship
下载PDF
Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks 被引量:4
5
作者 Yang Lu Jiguo Li 《China Communications》 SCIE CSCD 2019年第7期156-173,共18页
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to enc... Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks. 展开更多
关键词 searchable public key ENCRYPTION CERTIFICATELESS ENCRYPTION with keyword search INSIDE keyword guessing ATTACK OUTSIDE keyword guessing ATTACK random oracle model
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
6
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Keyword Cloud在文献检索中的应用研究 被引量:5
7
作者 廖凤 张建勇 《图书馆杂志》 CSSCI 北大核心 2010年第9期57-61,共5页
理论部分对Keyword Cloud的来源、概念、功能以及在图书馆服务中的需求分析进行介绍,为实际应用奠定理论基础。实践部分将Keyword Cloud应用于文献数据库检索服务中,用于汇总检索结果和辅助二次检索;同时引入TagLine技术为传统Keyword C... 理论部分对Keyword Cloud的来源、概念、功能以及在图书馆服务中的需求分析进行介绍,为实际应用奠定理论基础。实践部分将Keyword Cloud应用于文献数据库检索服务中,用于汇总检索结果和辅助二次检索;同时引入TagLine技术为传统Keyword Cloud增加时间框架,便于用户观察热点趋势变化;通过用户调查对Keyword Cloud的实用性和适用性进行评价;总结下一步工作的重点在于关键词语义关系的构建。 展开更多
关键词 云图 标签云图 标签线图 关键词检索 二次检索
下载PDF
Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack 被引量:3
8
作者 Xiaoling Yu Chungen Xu +1 位作者 Lei Xu Yuntao Wang 《Computers, Materials & Continua》 SCIE EI 2020年第8期1107-1125,共19页
To save the local storage,users store the data on the cloud server who offers convenient internet services.To guarantee the data privacy,users encrypt the data before uploading them into the cloud server.Since encrypt... To save the local storage,users store the data on the cloud server who offers convenient internet services.To guarantee the data privacy,users encrypt the data before uploading them into the cloud server.Since encryption can reduce the data availability,public-key encryption with keyword search(PEKS)is developed to achieve the retrieval of the encrypted data without decrypting them.However,most PEKS schemes cannot resist quantum computing attack,because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers.Besides,the traditional PEKS schemes have an inherent security issue that they cannot resist inside keywords guessing attack(KGA).In this attack,a malicious server can guess the keywords encapsulated in the search token by computing the ciphertext of keywords exhaustively and performing the test between the token and the ciphertext of keywords.In the paper,we propose a lattice-based PEKS scheme that can resist quantum computing attacks.To resist inside KGA,this scheme adopts a lattice-based signature technique into the encryption of keywords to prevent the malicious server from forging a valid ciphertext.Finally,some simulation experiments are conducted to demonstrate the performance of the proposed scheme and some comparison results are further shown with respect to other searchable schemes. 展开更多
关键词 Searchable encryption lattice assumption inside keywords guessing attack post-quantum secure
下载PDF
K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing 被引量:4
9
作者 Wei Zhou Lixi Liu +3 位作者 He Jing Chi Zhang Shaowen Yao Shipu Wang 《Journal of Software Engineering and Applications》 2013年第1期29-32,共4页
With recent significant development in the portable device market, cloud computing is getting more and more utilized. Many sensitive data are stored in cloud central servers. To ensure privacy, these data are usually ... With recent significant development in the portable device market, cloud computing is getting more and more utilized. Many sensitive data are stored in cloud central servers. To ensure privacy, these data are usually encrypted before being uploaded—making file searching complicated. Although previous cloud computing searchable encryption schemes allow users to search encrypted data by keywords securely, these techniques only support exact keyword search and will fail if there are some spelling errors or if some morphological variants of words are used. In this paper, we provide the solution for fuzzy keyword search over encrypted cloud data. K-grams is used to produce fuzzy results. For security reasons, we use two separate servers that cannot communicate with each other. Our experiment result shows that our system is effective and scalable to handle large number of encrypted files. 展开更多
关键词 K-Gram FUZZY keyword Encrypted CLOUD COMPUTING
下载PDF
An improved algorithm for weighting keywords in web documents 被引量:1
10
作者 孙双 贺樑 +1 位作者 杨静 顾君忠 《Journal of Shanghai University(English Edition)》 CAS 2008年第3期235-239,共5页
In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of t... In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of the TF*IDF, TFC and ITC algorithms in order to make it more appropriate for web documents. Meanwhile, the presented algorithm is applied to improved vector space model (IVSM). A real system has been implemented for calculating semantic similarities of web documents. Four experiments have been carried out. They are keyword weight calculation, feature item selection, semantic similarity calculation, and WKWA time performance. The results demonstrate accuracy of keyword weight, and semantic similarity is improved. 展开更多
关键词 improved vector space model (IVSM) representation feature feature item keyword weight semantic similarity
下载PDF
A Metric Approach to Hot Topics in Biomedicine via Keyword Co-occurrence 被引量:1
11
作者 Jane H.Qin Jean J.Wang Fred Y.Ye 《Journal of Data and Information Science》 CSCD 2019年第4期13-25,共13页
Purpose:To reveal the research hotpots and relationship among three research hot topics in b iomedicine,namely CRISPR,iPS(induced Pluripotent Stem)cell and Synthetic biology.Design/methodology/approach:We set up their... Purpose:To reveal the research hotpots and relationship among three research hot topics in b iomedicine,namely CRISPR,iPS(induced Pluripotent Stem)cell and Synthetic biology.Design/methodology/approach:We set up their keyword co-occurrence networks with using three indicators and information visualization for metric analysis.Findings:The results reveal the main research hotspots in the three topics are different,but the overlapping keywords in the three topics indicate that they are mutually integrated and interacted each other.Research limitations:All analyses use keywords,without any other forms.Practical implications:We try to find the information distribution and structure of these three hot topics for revealing their research status and interactions,and for promoting biomedical developments.Originality/value:We chose the core keywords in three research hot topics in biomedicine by using h-index. 展开更多
关键词 keyword co-occurrence Network analysis Information visualization BIOMEDICINE Hot topics CRISPR-Cas iPS cell Synthetic biology
下载PDF
An Efficient Multi-Keyword Query Processing Strategy on P2P Based Web Search 被引量:2
12
作者 SHEN Derong LI Meifang +1 位作者 ZHU Hongkai YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期881-886,共6页
The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the c... The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the correlations of keywords and coverage and overlap of the peers to decrease the time cost, and then presents a two-layered architecture for query processing that utilizes Bloom filter as compact representation to reduce the bandwidth consumption. Extensive experiments conducted on a real world dataset have demonstrated that our approach obviously decreases the processing time, while improves the precision and recall as well. 展开更多
关键词 multi-keyword P2P Web search CORRELATION coverage and overlap Nash equilibrium
下载PDF
Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data 被引量:1
13
作者 TENG Yiping CHENG Xiang +2 位作者 SU Sen WANG Yulong SHUANG Kai 《China Communications》 SCIE CSCD 2015年第12期109-121,共13页
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all... In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution. 展开更多
关键词 similarity keyword preserving cloud collection privacy validity files ranking separate
下载PDF
WoS题录Keywords字段关键词频度统计程序设计与实现 被引量:1
14
作者 朱玉强 《情报探索》 2015年第6期86-89,共4页
使用Visual Basic编程,采用正则表达式批量提取由Web of Science导出的Bib Tex题录中所有Keywords字段关键词,按需合并所得关键词的同义词、近义词及词形变化词,然后将出现频度的统计数据写入Excel表,并编制Excel宏自动生成折线图,实现... 使用Visual Basic编程,采用正则表达式批量提取由Web of Science导出的Bib Tex题录中所有Keywords字段关键词,按需合并所得关键词的同义词、近义词及词形变化词,然后将出现频度的统计数据写入Excel表,并编制Excel宏自动生成折线图,实现关键词分布的简单可视化。情报工作者后续可借助Excel功能对该程序生成的Excel表执行复杂的数据组合分析,以提高工作效率。 展开更多
关键词 Web of Science(WoS) 关键词 词频统计 Excel BibTex Visual Basic(VB)
下载PDF
Incremental Training for SVM-Based Classification with Keyword Adjusting
15
作者 SUNJin-wen YANGJian-wu LUBin XIAOJian-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期805-811,共7页
This paper analyzed the theory of incremental learning of SVM (support vector machine) and pointed out it is a shortage that the support vector optimization is only considered in present research of SVM incremental le... This paper analyzed the theory of incremental learning of SVM (support vector machine) and pointed out it is a shortage that the support vector optimization is only considered in present research of SVM incremental learning. According to the significance of keyword in training, a new incremental training method considering keyword adjusting was proposed, which eliminates the difference between incremental learning and batch learning through the keyword adjusting. The experimental results show that the improved method outperforms the method without the keyword adjusting and achieve the same precision as the batch method. Key words SVM (support vector machine) - incremental training - classification - keyword adjusting CLC number TP 18 Foundation item: Supported by the National Information Industry Development Foundation of ChinaBiography: SUN Jin-wen (1972-), male, Post-Doctoral, research direction: artificial intelligence, data mining and system integration. 展开更多
关键词 SVM (support vector machine) incremental training CLASSIFICATION keyword adjusting
下载PDF
KEYWORDS INDEX(2006;Volume 8)
16
《Asian Journal of Andrology》 SCIE CAS CSCD 2006年第6期761-763,共3页
关键词 429 555 GENE Volume 8 keywordS INDEX
下载PDF
炭专业文献中的关键词(Keywords for carbons)——技术方法(Techniques)
17
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2008年第1期50-50,共1页
关键词 电子 轻子 TECHNIQUES keywords for carbons
下载PDF
KEYWORD INDEX (2000;Volume 2)
18
《Asian Journal of Andrology》 SCIE CAS CSCD 2000年第4期314-314,共1页
关键词 GENE TEST keyword INDEX
下载PDF
Keyword Index Vol.2,1991
19
《Chinese Chemical Letters》 SCIE CAS CSCD 1991年第12期991-1000,共10页
关键词 429 CO CO POLY keyword Index Vol.2 1991 555
下载PDF
Keyword Index Vol.3,1992
20
《Chinese Chemical Letters》 SCIE CAS CSCD 1992年第12期1038-1046,共9页
关键词 Poly PI keyword Index Vol.3 1992 DDB ACID 555
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部