Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification
暂无分享,去创建一个
Mounir Hamdi | Maode Ma | Bharat S. Rawal | Vijayakumar Varadarajan | M Poongodi | M. Ma | M. Hamdi | M. Poongodi | B. Rawal | M. Maode | Vijayakumar Varadarajan | P. M.
[1] Olasupo Ajayi,et al. An Overview of Data Storage in Cloud Computing , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).
[2] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[3] Nilima Dongre,et al. Ranked multi-keyword search data using cloud , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).
[4] Mikhail Strizhov. Towards a Practical and Efficient Search over Encrypted Data in the Cloud , 2015, 2015 IEEE International Conference on Cloud Engineering.
[5] Wang Shangping,et al. A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[6] Geong Sen Poh,et al. On the security advantages of block-based multiserver searchable symmetric encryption , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[7] Harry Halpin,et al. Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[8] Tian Xia,et al. An improvement to TF-IDF: Term Distribution based Term Weight Algorithm , 2011, J. Softw..
[9] Ee-Chien Chang,et al. Passive Attacks Against Searchable Encryption , 2019, IEEE Transactions on Information Forensics and Security.
[10] Qichao Zhang,et al. A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[11] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[12] Gang Chen,et al. Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.
[13] Christina Fragouli,et al. Group secret key generation over broadcast erasure channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.