Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[2] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[4] Jan Jannink,et al. Implementing deletion in B+-trees , 1995, SGMD.
[5] Giovanni Russello,et al. Secure and Practical Searchable Encryption: A Position Paper , 2017, ACISP.
[6] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[7] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[8] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[9] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[10] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[11] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[12] Rafail Ostrovsky,et al. Private Large-Scale Databases with Distributed Searchable Symmetric Encryption , 2016, CT-RSA.
[13] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[14] Bruno Crispo,et al. Supporting complex queries and access policies for multi-user encrypted databases , 2013, CCSW.
[15] Peter Williams,et al. Usable PIR , 2008, NDSS.
[16] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.