-
5
-
-
45749144747
-
-
IBM Corporation: IBM TotalStorage DR550 (2006), http://www-03.ibm.com/ systems/storage/index.html
-
(2006)
, vol.DR550
-
-
TotalStorage, I.B.M.1
-
7
-
-
85054431103
-
Trustworthy keyword search for regulatory-compliant records retention
-
Dayal, U, Whang, K.Y, Lomet, D, Alonso, G, Lohman, G, Kersten, M, Cha, S.K, Kim, Y.K, eds, VLDB Endowment, September
-
Mitra, S., Hsu, W.W., Winslett, M.: Trustworthy keyword search for regulatory-compliant records retention. In: Dayal, U., Whang, K.Y., Lomet, D., Alonso, G., Lohman, G., Kersten, M., Cha, S.K., Kim, Y.K. (eds.) Conference on Very Large Data Bases, VLDB Endowment, September 2006, pp. 1001-1015 (2006)
-
(2006)
Conference on Very Large Data Bases
, pp. 1001-1015
-
-
Mitra, S.1
Hsu, W.W.2
Winslett, M.3
-
9
-
-
0003756969
-
-
Morgan Kaufmann, San Francisco
-
Witten, I.H., Moffat, A., Bell, T.C.: Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann, San Francisco (1999)
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
10
-
-
29844432195
-
Fossilized index: The linchpin of trustworthy non-alterable electronic records
-
ACM, New York
-
Zhu, Q., Hsu, W.W.: Fossilized index: the linchpin of trustworthy non-alterable electronic records. In: ACM SIGMOD International Conference on Management of Data, pp. 395-406. ACM, New York (2005)
-
(2005)
ACM SIGMOD International Conference on Management of Data
, pp. 395-406
-
-
Zhu, Q.1
Hsu, W.W.2
-
11
-
-
43349099044
-
-
Mitra, S., Winslett, M., Borisov, N.: Deleting index entries from compliance storage. In: Kemper, A. (ed.) Conference on Extending Database Technology (March 2008)
-
Mitra, S., Winslett, M., Borisov, N.: Deleting index entries from compliance storage. In: Kemper, A. (ed.) Conference on Extending Database Technology (March 2008)
-
-
-
-
12
-
-
34547273527
-
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Wright, R., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, October 2006, pp. 89-98. ACM, New York (2006)
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Wright, R., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, October 2006, pp. 89-98. ACM, New York (2006)
-
-
-
-
13
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
Frey, G., Rück, H.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation 62(206), 865-874 (1994)
-
(1994)
Mathematics of Computation
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.2
-
14
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory 39(5), 1639-1646 (1993)
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
15
-
-
0035336179
-
New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
-
Miyaji, A., Nakabayashi, M., Takano, S.: New Explicit Conditions of Elliptic Curve Traces for FR-Reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 84(5), 1234-1243 (2001)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.84
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
16
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive
-
Report 2005/417
-
Ballard, L., Green, M., de Medeiros, B., Monrose, F.: Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive, Report 2005/417 (2005), http://eprint.iacr.org/
-
(2005)
-
-
Ballard, L.1
Green, M.2
de Medeiros, B.3
Monrose, F.4
-
17
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4) (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
-
-
Joux, A.1
-
18
-
-
3042683432
-
Message authentication using hash functions: The HMAC construction
-
Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. CryptoBytes 2(1), 12-15 (1996)
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 12-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
19
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
20
-
-
34247363892
-
Secure indexes. Cryptology ePrint Archive
-
Report 2003/216
-
Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/
-
(2003)
-
-
Goh, E.J.1
-
21
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
22
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: Network and Distributed System Security Symposium (2004)
-
(2004)
Network and Distributed System Security Symposium
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
23
-
-
45749126073
-
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: International Conference on Applied Cryptography and Network Security (June 2004)
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: International Conference on Applied Cryptography and Network Security (June 2004)
-
-
-
-
24
-
-
33646736337
-
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
-
Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
25
-
-
23944469009
-
-
WISA, pp
-
Park, D., Kim, K., Lee, P.: Public key encryption with conjunctive field keyword search. In: WISA, pp. 73-86 (2004)
-
(2004)
Public key encryption with conjunctive field keyword search
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
26
-
-
33746214783
-
-
Byun, J., Lee, D., Lim, J.: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, 4043, pp. 184-196. Springer, Heidelberg (2006)
-
Byun, J., Lee, D., Lim, J.: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184-196. Springer, Heidelberg (2006)
-
-
-
-
27
-
-
50049095455
-
-
Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, 4575, Springer, Heidelberg (2007)
-
Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, Springer, Heidelberg (2007)
-
-
-
-
29
-
-
45749140863
-
-
Chase, M.: Multi-authority attribute-based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
-
Chase, M.: Multi-authority attribute-based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
-
-
-
-
31
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
33
-
-
45749124402
-
-
Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: Arbaugh, W., Cowan, C. (eds.) Network and Distributed Systems Security Symposium (March 2007)
-
Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: Arbaugh, W., Cowan, C. (eds.) Network and Distributed Systems Security Symposium (March 2007)
-
-
-
|