Searched for: subject%3A%22searchable%255C%2Bencryption%22
(1 - 5 of 5)
document
van Schaick, Bart (author)
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...
master thesis 2023
document
Lambregts, Steven (author)
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, these leakages are caused by practical designs but are considered an...
master thesis 2022
document
Bulină, Malina (author)
Data outsourcing has become one of the primary means for preserving information as it passes the responsibility of storage management to the service provider. However, storing sensitive data remotely poses privacy threats for the data owners. Searchable encryption (SE) is a technique that allows performing search queries over encrypted data. The...
bachelor thesis 2022
document
Lambregts, Steven (author), Chen, H. (author), Ning, Jianting (author), Liang, K. (author)
Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but are considered an acceptable price to achieve high search...
conference paper 2022
document
Nasrullah, I.H. (author)
Detecting and tracking of objects by a tracking device can be considered a breach of privacy when an unauthorised party can associate certain tracking information outputted by the tracker to the identity of an individual. Therefore, when this privacy-sensitive information is stored in a database, it is desired that this is done in a secure...
master thesis 2009
Searched for: subject%3A%22searchable%255C%2Bencryption%22
(1 - 5 of 5)