-
1
-
-
33745134401
-
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, in: CRYPTO 2005, LNCS 3621, 2005, pp. 205-222 (the full version appears in Journal of Cryptology (2007)).
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, in: CRYPTO 2005, LNCS 3621, 2005, pp. 205-222 (the full version appears in Journal of Cryptology (2007)).
-
-
-
-
2
-
-
38149068986
-
-
M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO 2007, LNCS 4622, 2007, pp. 535-552.
-
M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO 2007, LNCS 4622, 2007, pp. 535-552.
-
-
-
-
3
-
-
58249120225
-
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt 2004, LNCS 3089, 2004, pp. 31-45.
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt 2004, LNCS 3089, 2004, pp. 31-45.
-
-
-
-
4
-
-
84874324906
-
-
D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO 2001, LNCS 2139, 2001, pp. 213-229 (the full version appears in SIAM Journal of Computing 32 (3) (2003) 586-615).
-
D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO 2001, LNCS 2139, 2001, pp. 213-229 (the full version appears in SIAM Journal of Computing 32 (3) (2003) 586-615).
-
-
-
-
5
-
-
33750696320
-
-
J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: SDM 2006, LNCS 4165, 2006, pp. 75-83.
-
J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: SDM 2006, LNCS 4165, 2006, pp. 75-83.
-
-
-
-
6
-
-
58249111858
-
-
Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive: Report 2004/051, 2004.
-
Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive: Report 2004/051, 2004.
-
-
-
-
7
-
-
58249106478
-
-
E.J. Goh, Secure index, Cryptology ePrint Archive: Report 2003/216, 2003.
-
E.J. Goh, Secure index, Cryptology ePrint Archive: Report 2003/216, 2003.
-
-
-
-
8
-
-
33745120364
-
-
P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: ACNS 2004, LNCS 3089, 2004, pp. 31-45.
-
P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: ACNS 2004, LNCS 3089, 2004, pp. 31-45.
-
-
-
-
9
-
-
58249096783
-
-
F. Mish, Merriam-Webster's Collegiate Dictionary, 11th ed., Merriam-Webser Press, 2003. Refer to http://www.m-w.com/.
-
F. Mish, Merriam-Webster's Collegiate Dictionary, 11th ed., Merriam-Webser Press, 2003. Refer to http://www.m-w.com/.
-
-
-
-
11
-
-
23944469009
-
-
D.J. Park, K. Kim, P.J. Lee, Public key encryption with conjunctive field keyword search, in: WISA 2004, LNCS 3325, 2004, pp. 73-86.
-
D.J. Park, K. Kim, P.J. Lee, Public key encryption with conjunctive field keyword search, in: WISA 2004, LNCS 3325, 2004, pp. 73-86.
-
-
-
-
12
-
-
0033705124
-
-
D. Song, D. Wagner, A. Perrige, Practical techniques for searches on encrypted data, in: Proceedings of the IEEE Security and Privacy Symposium, 2000, pp. 44-55.
-
D. Song, D. Wagner, A. Perrige, Practical techniques for searches on encrypted data, in: Proceedings of the IEEE Security and Privacy Symposium, 2000, pp. 44-55.
-
-
-
|