对称可搜索加密,Cash的实现方案
☆19Jun 10, 2018Updated 7 years ago
Alternatives and similar repositories for CashScheme
Users that are interested in CashScheme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- ☆20Apr 28, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Aug 4, 2025Updated 7 months ago
- 对称可搜索加密SWP方案的C++实现☆20May 5, 2021Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆77Apr 3, 2024Updated last year
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 5 years ago
- Path ORAM reference implementation☆35Jul 25, 2020Updated 5 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- This is the official supplementary document for the GCT data and its prediction task.☆10Feb 19, 2024Updated 2 years ago
- ☆56Apr 4, 2022Updated 3 years ago
- In public-key cryptography, the Station-to-Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie–Hellman…☆11Mar 16, 2016Updated 10 years ago
- 这是一款本人仿照外星人入侵制作的python小游戏,利用了pygame游戏库。跟以前我们在诺基亚手机上玩的坦克大战Java游戏一模一样。☆11Apr 8, 2024Updated last year
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆208Jun 29, 2022Updated 3 years ago
- My introduction project to the Ethereum Blockchain, Solidity, and Smart Contracts.☆17Sep 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simulating communication in a VANET (Vehicular Ad-Hoc Networks), and implementing access control, using concepts from blockchains, mainta…☆16Apr 29, 2022Updated 3 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- A blockchain demo that supports user attribute storage and authentication based on Ethereum and Web3.py☆11Sep 26, 2020Updated 5 years ago
- 使用python的pycrypto、m2crypto模块完成AES、RSA加解密文件,实现文件安全传输☆28Aug 31, 2017Updated 8 years ago
- K8 secrets as Hyperledger Fabric wallet using Fabric Java SDK☆11Dec 22, 2021Updated 4 years ago
- 房链——基于FISCO-BCOS的区块链应用☆13Jun 30, 2020Updated 5 years ago
- Java library for Elliptic Curve Cryptography☆13Aug 20, 2018Updated 7 years ago
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- Fabric JDBC connector implements a pure java, type 4 JDBC driver that executes SQL queries on Hyperledger fabric Blockchain.☆18Dec 11, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Sep 16, 2021Updated 4 years ago
- java sdk demo☆18Mar 20, 2026Updated last week
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Feb 11, 2020Updated 6 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago
- BCCSP RSA&Java SDK to allow Hyperledger Fabric end to end support for RSA certificates☆13Jan 23, 2019Updated 7 years ago