-
1
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2009.
-
(2009)
ACM SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
2
-
-
77956137294
-
Cryptographic cloud storage
-
RLCPS, January, Springer, Heidelberg
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in RLCPS, January 2010, LNCS. Springer, Heidelberg.
-
(2010)
LNCS
-
-
Kamara, S.1
Lauter, K.2
-
3
-
-
0344756842
-
Modern information retrieval: A brief overview
-
A. Singhal, "Modern information retrieval: A brief overview," IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 35-43, 2001.
-
(2001)
IEEE Data Engineering Bulletin
, vol.24
, Issue.4
, pp. 35-43
-
-
Singhal, A.1
-
4
-
-
34548056963
-
Managing gigabytes: Compressing and indexing documents and images
-
May
-
I. H. Witten, A. Moffat, and T. C. Bell, "Managing gigabytes: Compressing and indexing documents and images," Morgan Kaufmann Publishing, San Francisco, May 1999.
-
(1999)
Morgan Kaufmann Publishing, San Francisco
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
5
-
-
77949787383
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P, 2000.
-
(2000)
Proc. of S&P
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
6
-
-
33244488406
-
-
E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, 2003,. http://eprint.iacr.org/2003/216
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
-
7
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. of ACNS, 2005.
-
(2005)
Proc. of ACNS
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions,"in Proc. of ACM CCS, 2006.
-
(2006)
Proc. of ACM CCS
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of EUROCRYPT, 2004.
-
(2004)
Proc. of EUROCRYPT
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
11
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions," J. Cryptol., vol. 21, no. 3, pp. 350-391, 2008.
-
(2008)
J. Cryptol.
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
12
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA March
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. of IEEE INFOCOM'10 Mini-Conference, San Diego, CA, USA, March 2010.
-
(2010)
Proc. of IEEE INFOCOM'10 Mini-Conference
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
13
-
-
77958078259
-
Public key encryption that allows pir queries
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S. III, "Public key encryption that allows pir queries," in Proc. of CRYPTO, 2007.
-
(2007)
Proc. of CRYPTO
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
S III, W.E.4
-
14
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of ACNS, 2004, pp. 31-45.
-
(2004)
Proc. of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
15
-
-
34547239322
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. of ICICS, 2005.
-
(2005)
Proc. of ICICS
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
16
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC, 2007, pp. 535-554.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
18
-
-
80052378201
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Pairing, 2007.
-
(2007)
Pairing
-
-
Hwang, Y.1
Lee, P.2
-
19
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. Of EUROCRYPT, 2008.
-
(2008)
Proc. of EUROCRYPT
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
20
-
-
77957002082
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. of EUROCRYPT, 2010.
-
(2010)
Proc. of EUROCRYPT
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
21
-
-
77649191203
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in Proc. of TCC, 2009.
-
(2009)
Proc. of TCC
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
22
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. of ICDCS'10, 2010.
-
(2010)
Proc. of ICDCS'10
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
23
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. Of INFOCOM, 2010.
-
(2010)
Proc. of INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
24
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. Of INFOCOM, 2010.
-
(2010)
Proc. of INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
25
-
-
43349086436
-
Zerber: R-confidential indexing for distributed documents
-
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, "Zerber: r-confidential indexing for distributed documents," in Proc. Of EDBT, 2008, pp. 287-298.
-
(2008)
Proc. of EDBT
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
-
26
-
-
70349110963
-
Zerber+r: Top-kretrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-kretrieval from a confidential index," in Proc. of EDBT, 2009, pp. 439-449.
-
(2009)
Proc. of EDBT
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
27
-
-
38049021884
-
Cryptography from anonymity
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Cryptography from anonymity," in Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006, pp. 239-248.
-
(2006)
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
28
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in Proceedings of the 35th SIGMOD international conference on Management of data, 2009, pp. 139-152.
-
(2009)
Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
|