Multi-group ObScure logging (MG-OSLo) A privacy-preserving protocol for private web search

M Ullah, R Khan, MIU Haq, A Khan, W Alosaimi… - IEEE …, 2021 - ieeexplore.ieee.org
The Web Search Engine (WSE) is a software system used to retrieve data from the web
successfully. WSE uses the user's search queries to build the user's profile and provide …

Senso scale: a framework to preserve privacy over cloud using sensitivity range

N Singh, I Gupta, AK Singh - Advances in Cyber Security and …, 2022 - taylorfrancis.com
Data sharing in the cloud is operated by favorable scalable trends in the field. A cloud
provides flexibility to store a large amount of variable data, ensuring the emergence of a …

[PDF][PDF] SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud.

N Singh, AK Singh - Pertanika Journal of Science & Technology, 2019 - 119.40.116.186
The cloud is storing a huge amount of the data, including personal and confidential details. It
involves the third party over the internet and proposes many unreliable strings which can be …

Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy‐Preserving Protocol to Mitigate Digital Traces

M Ullah, RU Khan, IU Khan, N Aslam… - Security and …, 2022 - Wiley Online Library
Web search querying is an inevitable activity of any Internet user. The web search engine
(WSE) is the easiest way to search and retrieve data from the Internet. The WSE stores the …

ObSecure Logging (OSLo): a framework to protect and evaluate the web search privacy in health care domain

M Ullah, MA Islam, R Khan, M Aleem… - Journal of Medical …, 2019 - ingentaconnect.com
Users around the world send queries to the Web Search Engine (WSE) to retrieve data from
the Internet. Users usually take primary assistance relating to medical information from WSE …

Combinatorics of Complex Maximal Determinant Matrices

GN Ponasso - arXiv preprint arXiv:2404.09040, 2024 - arxiv.org
This doctoral thesis covers several topics related to the construction and study of maximal
determinant matrices with complex entries. The first three chapters are devoted to number …

On private information retrieval supporting range queries

J Hayata, JCN Schuldt, G Hanaoka… - International Journal of …, 2024 - Springer
Private information retrieval (PIR) allows a client to retrieve data from a database without the
database server learning what data are being retrieved. Although many PIR schemes have …

Multi-value private information retrieval with colluding databases via trace functions

Y Li, Y Chang, M Cheng, T Feng - Information Sciences, 2021 - Elsevier
A classic t-private PIR (private information retrieval) scheme allows a user to retrieve one out
of n values from k communicating replicated databases while any t of the k databases …

[PDF][PDF] Obsecure logging: A framework to protect and evaluate the web search privacy

M Ullah - 2020 - cust.edu.pk
Abstract Web Search Engine (WSE) is an inevitable software system used by people around
the world to retrieve data from the web. WSE stores search queries to build the user's profile …

Improved user-private information retrieval via finite geometry

OW Gnilke, M Greferath, C Hollanti… - Designs, Codes and …, 2019 - Springer
In a user-private information retrieval (UPIR) scheme, a set of users collaborate to retrieve
files from a database without revealing to observers which participant in the scheme …