Hierarchical Multi-Keyword Ranked search for secured document retrieval in public clouds
暂无分享,去创建一个
[1] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[2] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[3] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[4] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[5] Elisa Bertino,et al. Privacy Preserving Delegated Access Control in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.
[6] Ann Q. Gates,et al. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2005 .
[7] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[8] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[9] Elisa Bertino,et al. A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[10] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[11] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[12] Elisa Bertino,et al. Towards privacy preserving access control in the cloud , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[13] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[14] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[15] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[16] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[17] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[18] Ann Q. Gates,et al. TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS , 2005 .
[19] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[20] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.