Privacy preserving confidential forensic investigation for shared or remote servers

S Hou, T Uehara, SM Yiu, LCK Hui… - … Information Hiding and …, 2011 - ieeexplore.ieee.org
It is getting popular that customers make use of third party data service providers to store
their data and emails. It is common to have a large server shared by many different users …

Global heuristic search on encrypted data (GHSED)

M Halloush, M Sharif - arXiv preprint arXiv:0909.2366, 2009 - arxiv.org
Important document are being kept encrypted in remote servers. In order to retrieve these
encrypted data, efficient search methods needed to enable the retrieval of the document …

Encrypted data inquiries using chained perfect hashing (CPH)

K Kaabneh, H Tarawneh, I Alhadid - AIP Conference Proceedings, 2017 - pubs.aip.org
Cryptography is the practice of transforming data to indecipherable by a third party, unless a
particular piece of secret information is made available to them. Data encryption has been …

[引用][C] Applying Advanced Searching Techniques to Encrypted Data

MS Halloush - 2007 - Al-Balqa Applied University Jordan