Q Wang, Y Zhang, X Lu, Z Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays gigantic crowd-sourced data from mobile devices have become widely available in social networks, enabling the possibility of many important data mining applications to …
X Jiang, J Yu, J Yan, R Hao - Information Sciences, 2017 - Elsevier
With the prevalence of the cloud computing, data owners can outsource their data to the cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …
C Huang, D Liu, A Yang, R Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we propose a multi-client secure and efficient keyword search scheme for cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …
M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …
CEJ Singh, CA Sunitha - Expert Systems with Applications, 2022 - Elsevier
Abstract Internet of Things (IoT) is a materializing technology that has considerable technical, social, and economic importance. The present day predictions for the influence of …
C Sekar, VR Falmari, M Brindha - Internet of Things, 2023 - Elsevier
In the digitizing medical field, secure sharing of patients' medical records over the Internet while preserving privacy is critical. Medical image encryption safeguards healthcare, IoMT …
The wide adoption of cloud greatly facilitates the sharing of explosively generated media content today, yet deprives content providers' direct control over the outsourced media …
Similarity search on high-dimensional data has been intensively studied for data processing and analytics. Despite its broad applicability, data security and privacy concerns along the …
D Rayappan, M Pandiyan - Wireless Networks, 2021 - Springer
The exponential rise in software computing and internet technologies have broadened the horizon of cloud computing applications serving numerous purposes like business …