共 9 条
[2]
Privacy-preserving data utilization in hybrid clouds[J] . Jingwei Li,Jin Li,Xiaofeng Chen,Zheli Liu,Chunfu Jia.Future Generation Computer Systems . 2013
[4]
Constructing PEKS schemes secure against keyword guessing attacks is possible?[J] . Ik Rae Jeong,Jeong Ok Kwon,Dowon Hong,Dong Hoon Lee.Computer Communications . 2008 (2)
[5]
Searchable symmetric encryption:Improved definitions and efficient constructions .2 Curtmola R,Garay J,Kamara S,Ostrovsky R. Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS) . 2006
[6]
Pairing-based cryptography .2 Hwang Y H,Lee P J. Berlin . 2007
[7]
Achieving efficient conjunctive keyword searches over encrypted data .2 Lucas Ballard,Seny Kamara,Fabian Monrose. Information and Communications Security . 2005
[8]
Public-key encryption with registered keyword search .2 Tang Q,Chen L. Public Key Infrastructures,Services and Applications . 2010
[9]
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers .2 Chai Q,Gong G. 2012 IEEE International Conference on Communications (ICC) . 2012