We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. On private information retrieval supporting range queries

    Private information retrieval (PIR) allows a client to retrieve data from a database without the database server learning what data are being...

    Junichiro Hayata, Jacob C. N. Schuldt, ... Kanta Matsuura in International Journal of Information Security
    Article 26 September 2023
  2. On the effectiveness of differential privacy to continuous queries

    Location-based services have a wide range of applications; more recent among those include monitoring virus spread and disaster management....

    Puspanjali Ghoshal, Mohit Dhaka, Ashok Singh Sairam in Service Oriented Computing and Applications
    Article 01 May 2024
  3. IXT: Improved searchable encryption for multi-word queries based on PSI

    Oblivious Cross-Tags (OXT) [ 1 ] is the first efficient searchable encryption (SE) protocol for conjunctive queries in a single-writer single-reader...

    Yunbo Yang, **aolei Dong, ... Shangmin Dou in Frontiers of Computer Science
    Article 06 January 2023
  4. Private Boolean Queries on Encrypted Data

    Alessandro Barenghi, Gerardo Pelosi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2023
  5. Efficient searchable symmetric encryption supporting range queries

    The demand for cloud storage services continuously increases putting at risk the privacy of the outsourced data. Data encryption is the obvious...

    Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis in International Journal of Information Security
    Article 09 February 2023
  6. Local dampening: differential privacy for non-numeric queries via local sensitivity

    Differential privacy is the state-of-the-art formal definition for data release under strong privacy guarantees. A variety of mechanisms have been...

    Victor A. E. Farias, Felipe T. Brito, ... Divesh Srivastava in The VLDB Journal
    Article 10 January 2023
  7. Boolean interpretation, matching, and ranking of natural language queries in product selection systems

    E-commerce is a massive sector in the US economy, generating $767.7 billion in revenue in 2021. E-commerce sites maximize their revenue by hel**...

    Matthew Moulton, Yiu-Kai Ng in Discover Computing
    Article Open access 03 April 2024
  8. Differentially private tree-based redescription mining

    Differential privacy provides a strong form of privacy and allows preserving most of the original characteristics of the dataset. Utilizing these...

    Matej Mihelčić, Pauli Miettinen in Data Mining and Knowledge Discovery
    Article Open access 16 April 2023
  9. A differentially private algorithm for range queries on trajectories

    Soheila Ghane, Lars Kulik, Kotagiri Ramamoharao in Knowledge and Information Systems
    Article 28 October 2020
  10. PLQ: An Efficient Approach to Processing Pattern-Based Log Queries

    As software systems grow more and more complex, extensive techniques have been proposed to analyze log data to obtain the insight of the system...

    Jia Chen, Peng Wang, ... Wei Wang in Journal of Computer Science and Technology
    Article 30 September 2022
  11. Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

    Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining...

    Qingqing Gan, Joseph K. Liu, ... Jianfeng Wang in Frontiers of Computer Science
    Article 02 April 2022
  12. Improving Accuracy of Interactive Queries in Personalized Differential Privacy

    Privacy-preserving data publishing has been an important research field in the era of big data. Various privacy protection schemes have been proposed...
    Mingjie Lu, Zhenhua Liu in Frontiers in Cyber Security
    Conference paper 2024
  13. Collusion-resistant protocols for private processing of aggregated queries in distributed databases

    Private processing of database queries protects the confidentiality of sensitive data when queries are answered. It is important to design...

    Leanne Rylands, Jennifer Seberry, ... Yuqing Lin in Distributed and Parallel Databases
    Article 15 May 2020
  14. Differentially Private Range Query on Shortest Paths

    We consider range queries on a graph under the constraints of differential privacy and query ranges are defined as the set of edges on the shortest...
    Chengyuan Deng, Jie Gao, ... Chen Wang in Algorithms and Data Structures
    Conference paper 2023
  15. Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains

    Abstract

    The use of blockchain in 5G networks gives a number of opportunities to improve security, privacy, and quality of service. However, despite...

    I. R. Fedorov, A. V. Pimenov, ... S. V. Bezzateev in Automatic Control and Computer Sciences
    Article 01 December 2022
  16. Private Range Queries

    Living reference work entry 2021
  17. Advanced Queries

    At this point, most of you will know enough about queries from what you have learned so far that you will likely not need any of the material from...
    Lukas Jungmann, Mike Keith, ... Massimo Nardone in Pro Jakarta Persistence in Jakarta EE 10
    Chapter 2022
  18. Private Set Operations from Multi-query Reverse Private Membership Test

    Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of...
    Yu Chen, Min Zhang, ... Weiran Liu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  19. Relation representation based on private and shared features for adaptive few-shot link prediction

    Although Knowledge Graphs (KGs) provide great value in many applications, they are often incomplete with many missing facts. KG Completion (KGC) is a...

    Weiwen Zhang, Canqun Yang in Journal of Intelligent Information Systems
    Article 10 April 2024
  20. Scaling Mobile Private Contact Discovery to Billions of Users

    Mobile contact discovery is a convenience feature of messengers such as WhatsApp or Telegram that helps users to identify which of their existing...
    Laura Hetz, Thomas Schneider, Christian Weinert in Computer Security – ESORICS 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.