An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage
暂无分享,去创建一个
Rong Hao | Fanyu Kong | Jia Yu | Xiangguo Cheng | Xiuxiu Jiang | Xinrui Ge
[1] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[2] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[3] Jin Li,et al. Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing , 2013, Comput. Informatics.
[4] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[5] Klaus Zaerens,et al. Gaining the profits of cloud computing in a public authority environment , 2012, Int. J. Comput. Sci. Eng..
[6] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[7] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[8] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[9] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[10] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[11] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[12] Farookh Khadeer Hussain,et al. A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..
[13] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[14] Rong Hao,et al. A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[15] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[17] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[18] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[19] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[20] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[21] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[22] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[23] Massimo Ficco. Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..
[24] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[25] Zhihua Xia,et al. Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).
[26] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[27] Yiwei Thomas Hou,et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).