Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data
暂无分享,去创建一个
Li Miao | Xianwei Zhou | Haitao Xu | Shuai Li | Xianwei Zhou | Haitao Xu | Shuai Li | Li Miao
[1] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[2] Fuchun Guo,et al. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[5] Willy Susilo,et al. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[6] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[7] Viet Cuong Trinh,et al. A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL , 2019 .
[8] Zi-Quan Hong,et al. Algebraic feature extraction of image for recognition , 1991, Pattern Recognit..
[9] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[10] Shahram Khazaei,et al. Publicly verifiable searchable symmetric encryption based on efficient cryptographic components , 2019, Des. Codes Cryptogr..
[11] Victor I. Chang,et al. Semantic keyword searchable proxy re‐encryption for postquantum secure cloud storage , 2017, Concurr. Comput. Pract. Exp..
[12] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[13] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[14] Davis,et al. Principles of Data Mining , 2001 .
[15] Ronen Feldman,et al. Book Reviews: The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data by Ronen Feldman and James Sanger , 2008, CL.
[16] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[17] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[18] David Pearce,et al. The aurora experimental framework for the performance evaluation of speech recognition systems under noisy conditions , 2000, INTERSPEECH.
[19] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[20] Eric Gossett,et al. Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .
[21] Dong Hoon Lee,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible? , 2009, Comput. Commun..
[22] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[23] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[24] Ck Cheng,et al. The Age of Big Data , 2015 .
[25] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[26] Simon D. Byers. Information leakage caused by hidden data in published documents , 2004, IEEE Security & Privacy Magazine.
[27] Raphael C.-W. Phan,et al. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage , 2015, Human-centric Computing and Information Sciences.
[28] Keqin Li,et al. CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme , 2019, IEEE Access.
[29] Fangguo Zhang,et al. Deniable Searchable Symmetric Encryption , 2017, Inf. Sci..
[30] Heikki Mannila,et al. Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.
[31] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[32] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[33] Yong Xiang,et al. Protection of Big Data Privacy , 2016, IEEE Access.
[34] Fuchun Guo,et al. Server-Aided Public Key Encryption With Keyword Search , 2016, IEEE Transactions on Information Forensics and Security.
[35] Sherali Zeadally,et al. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage , 2018, Soft Comput..
[36] HongZi-Quan. Algebraic feature extraction of image for recognition , 1991 .