A comparative survey of searchable encryption schemes
暂无分享,去创建一个
[1] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[2] Jian Shen,et al. Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).
[3] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[4] M. A. Ullah,et al. Cloud computing for future generation of computing technology , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).
[5] K. R. Venugopal,et al. Cloud enabled 3D tablet design for medical applications , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).
[6] Guido Appenzeller,et al. The mobile people architecture , 1999, MOCO.
[7] K. R. Venugopal,et al. Mobile cloud computing for medical applications , 2014, 2014 Annual IEEE India Conference (INDICON).
[8] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[9] K. R. Venugopal,et al. IGSK: Index Generation on Split Keyword for search over cloud data , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[10] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[11] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[12] Hyoung-Kee Choi,et al. Efficient Protocol for Searchable encryption and secure deletion on cloud storages , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).
[13] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[14] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[15] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[17] Yinqi Tang,et al. Phrase Search over Encrypted Data with Symmetric Encryption Scheme , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[18] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[19] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[20] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[21] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[22] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[23] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[24] Murat Kantarcioglu,et al. Multi-Keyword search over encrypted data with scoring and search pattern obfuscation , 2015, International Journal of Information Security.
[25] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.