对称可搜索加密,Cash的实现方案
☆19Jun 10, 2018Updated 7 years ago
Alternatives and similar repositories for CashScheme
Users that are interested in CashScheme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- ☆20Apr 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Aug 4, 2025Updated 8 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Jun 16, 2021Updated 4 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 6 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- Path ORAM reference implementation☆36Jul 25, 2020Updated 5 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆17Dec 14, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 本书是《5G Mobile Networks : A Systems Approach》(https://5g.systemsapproach.org/)的中文版翻译。☆13Jun 26, 2022Updated 3 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- This is the official supplementary document for the GCT data and its prediction task.☆10Feb 19, 2024Updated 2 years ago
- EthereumElders is a library for secure Ethereum smart contract development.It helps you to build custom contracts and more complex decent…☆11May 6, 2021Updated 4 years ago
- ☆56Apr 4, 2022Updated 4 years ago
- In public-key cryptography, the Station-to-Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie–Hellman…☆11Mar 16, 2016Updated 10 years ago
- 这是一款本人仿照外星人入侵制作的python小游戏,利用了pygame游戏库。跟以前我们在诺基亚手机上玩的坦克大战Java游戏一模一样。☆11Apr 8, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆209Jun 29, 2022Updated 3 years ago
- Code of our paper "Method-Level Bug Severity Prediction using Source Code Metrics and LLMs" which is accepted to ISSRE 2023.☆10Nov 12, 2023Updated 2 years ago
- Simulating communication in a VANET (Vehicular Ad-Hoc Networks), and implementing access control, using concepts from blockchains, mainta…☆16Apr 29, 2022Updated 3 years ago
- 使用python的pycrypto、m2crypto模块完成AES、RSA加解密文件,实现文件安全传输☆28Aug 31, 2017Updated 8 years ago
- Ring-Signature using secp256k1 in Solidity☆13Jul 6, 2018Updated 7 years ago
- 基于Spring Boot,Spring Cloud(Eureka,Gateway,Ribbon,Feign),Spring Security,JWT,MyBatis、Redis以及区块链技术实现多个token验证登录的大数据网关,大数据网关作为访问控制的节点,集成对用户身…☆12Dec 13, 2022Updated 3 years ago
- Quickly develop Chancode client applications based on SpringData and Hyperledger Fabric Chaincode SDK.☆11Jun 5, 2024Updated last year
- Java library for Elliptic Curve Cryptography☆13Aug 20, 2018Updated 7 years ago
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Even though spring security provides role-based access control it doesn’t allow users to perform policy-based authorization. The main goa…☆11Apr 5, 2019Updated 7 years ago
- Fabric JDBC connector implements a pure java, type 4 JDBC driver that executes SQL queries on Hyperledger fabric Blockchain.☆18Dec 11, 2018Updated 7 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Sep 16, 2021Updated 4 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Feb 11, 2020Updated 6 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago