I read in public key encryption with keyword search in construction trapdoor 'permutation source indistinguishable "can any one tell me what this mean?
create inverted index which consist of words mapping to files contain this words. then i want to encrypt this inverted index by using some encryption algorithm.
07 August 2019 3,615 7 View
When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible...
05 June 2019 4,143 6 View
iam already read about RC2 encryption algorithm but for mor explanation , i want an example that explain the algorithm.
06 July 2018 217 0 View
iam working in searching encrypted data, then retrieving from this data. i want to compute precision and recall so i want to know the formula to compute true positive , false positive , true...
03 April 2018 7,248 8 View
i write code contain vector of legth 1000 that vector split into two vectors of same length follow specific algorithm , this two vectors multiply into inverse of two matrices that should be the...
01 February 2018 8,944 5 View
I have binary vector of 0s and 1s that i want to encrypt it then make search in it. First i convert vector into hashmap Which key represent index of each dimension in this vector and value...
09 October 2017 4,098 2 View
iam working in searchable encryption. first i make index for set of files, the index is B+ tree , the leaf of this tree is bloom filter which represent the words in each file. each bloom filter...
09 October 2017 5,920 2 View
in the following code in euclidean hash some of the result of the rand.nextGaussian() implementation is negative when set dimension 100 and w is 2. which affect in the hash method. public...
06 July 2017 2,591 5 View
i want to implement Pseudo Random Function for these two functions in java: f(sk,.)={0,1}^* multiply sk ---> {0,1}^k, where sk is secret key (a random key). g(.,.)= {0,1}^k multiply {0,1}...
06 July 2017 4,431 3 View
he paper propose scheme for search in encrypted data using the tree of bloom filters as data structure to represent the index of the files then encrypted the leaves of the tree which consist of...
05 June 2017 1,504 2 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
02 March 2021 7,082 3 View
It should be standard journal (Indexed)
01 March 2021 8,379 1 View
I think we were all surprised at the first time we got to know quantum mechanics that the squared modulus of the wave function is the probability density of the existence of the particle? The role...
28 February 2021 6,282 9 View
Hi, I'm looking for public datasets that have CT, X-ray information, or medical records for patients with Covid-19. Does anyone have suggestions?
28 February 2021 4,760 3 View
One of the publication I co-authored has the author's name in abbreviation. Then, somebody whose nothing to do with that paper acquired it as her work. To whom in this RG shall I ask for a hand,...
27 February 2021 4,206 4 View
I want to publish paper in journal but I have figures which have drawn with bio-renders, can I put them in the paper or which other software I can use to draw them?
27 February 2021 8,179 1 View
I'm looking for the human CD34 promoter sequence to engineer into a vector construct. Can anyone recommend a good source for this sequence? Thanks very much, Laura
25 February 2021 8,205 1 View
Hello, I created a profile for my friend on google scholar. I have added a verified email address. I marked the profile as public. Formerly his profile was visible. However, now, When I type his...
24 February 2021 8,680 3 View
How was your publication experience with BBRJ in terms of peer review and reviewer comments. Did you find it fair and transparent ?
23 February 2021 3,810 6 View