Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
暂无分享,去创建一个
[1] Murat Kantarcioglu,et al. A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[2] Peter Weiner,et al. Linear Pattern Matching Algorithms , 1973, SWAT.
[3] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[4] Esko Ukkonen,et al. On-line construction of suffix trees , 1995, Algorithmica.
[5] Phillip Rogaway,et al. How to Encipher Messages on a Small Domain , 2009, CRYPTO.
[6] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[7] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[8] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[9] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[10] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[11] Mark Zhandry,et al. How to Avoid Obfuscation Using Witness PRFs , 2016, TCC.
[12] Indrajit Ray,et al. Multi-keyword Similarity Search Over Encrypted Cloud Data , 2014, IACR Cryptol. ePrint Arch..
[13] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[14] Nathan Chenette,et al. Efficient Fuzzy Search on Encrypted Data , 2014, FSE.
[15] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[16] Andrzej Ehrenfeucht,et al. Position heaps: A simple and dynamic text indexing data structure , 2011, J. Discrete Algorithms.
[17] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[18] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[19] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[20] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[21] K. Shadan,et al. Available online: , 2012 .
[22] Indrajit Ray,et al. Substring Position Search over Encrypted Cloud Data Using Tree-Based Index , 2015, 2015 IEEE International Conference on Cloud Engineering.
[23] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[24] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[25] Marina Blanton. Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[26] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[27] John Domingue,et al. The Future of the Internet , 1999, Academia Letters.
[28] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[29] Tarik Moataz,et al. Boolean symmetric searchable encryption , 2013, ASIA CCS '13.
[30] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[31] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[32] Nora Cuppens-Boulahia,et al. Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds , 2014, DBSec.
[33] Robert H. Deng,et al. Expressive search on encrypted data , 2013, ASIA CCS '13.
[34] Maxime Crochemore,et al. Algorithms on strings , 2007 .
[35] Eugene W. Myers,et al. Suffix arrays: a new method for on-line string searches , 1993, SODA '90.
[36] Z. Galil,et al. Pattern matching algorithms , 1997 .
[37] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[38] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[39] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.