-
1
-
-
84871208156
-
-
Googlehealth. https://www.google.com/health/.
-
Googlehealth
-
-
-
2
-
-
80051904847
-
-
At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded, 2006
-
At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded, 2006.
-
-
-
-
3
-
-
68249129760
-
-
Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing, Feb 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In Proceedings of ICCSA, Part I, ICCSA'08, pages 1249-1259, 2008.
-
(2008)
Proceedings of ICCSA, Part I, ICCSA'08
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
34547239322
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, and F. Monrose. Achieving efficient conjunctive keyword searches over encrypted data. In Proc. of ICICS'05, 2005.
-
(2005)
Proc. of ICICS'05
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
6
-
-
41549164259
-
Private query on encrypted data in multi-user settings
-
DOI 10.1007/978-3-540-79104-1-6, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
F. Bao, R. H. Deng, X. Ding, and Y. Yang. Private query on encrypted data in multi-user settings. In ISPEC'08, pages 71-85, Berlin, Heidelberg, 2008. Springer-Verlag. (Pubitemid 351465318)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4991
, pp. 71-85
-
-
Bao, F.1
Deng, R.H.2
Ding, X.3
Yang, Y.4
-
7
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter. Patient controlled encryption: ensuring privacy of electronic medical records. In CCSW'09, pages 103-114, 2009.
-
(2009)
CCSW'09
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
9
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In IEEE S& P'07, pages 321-334, 2007.
-
(2007)
IEEE S& P'07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC'07, pages 535-554, 2007.
-
(2007)
Proc. of TCC'07
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
12
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
-
Springer-Verlag
-
J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In PKC'09, pages 196-214. Springer-Verlag.
-
PKC'09
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
13
-
-
79960850152
-
Privacy-preserving multikeyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multikeyword ranked search over encrypted cloud data. In IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
14
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Proc. of ACNS'05, pages 442-455, 2005. (Pubitemid 41422132)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
19
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Springer-Verlag
-
P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In ACNS 04, pages 31-45. Springer-Verlag, 2004.
-
(2004)
ACNS 04
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
20
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
volume 4575 of LNCS
-
Y. Hwang and P. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing-Based Cryptography (Pairing 2007), volume 4575 of LNCS, pages 2-22. 2007.
-
(2007)
Pairing-Based Cryptography (Pairing 2007)
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
21
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT'08, pages 146-162, Berlin, Heidelberg, 2008. Springer-Verlag. (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
77957002082
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010.
-
(2010)
EUROCRYPT
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
23
-
-
79960878565
-
Findu: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou. Findu: Privacy-preserving personal profile matching in mobile social networks. In IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
26
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Sept.
-
M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In SecureComm'10, pages 89-106, Sept. 2010.
-
(2010)
SecureComm'10
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
27
-
-
80051913140
-
Distributed credential chain discovery in trust management: Extended abstract
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management: extended abstract. In ACM CCS.
-
ACM CCS
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
28
-
-
80051872536
-
Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network
-
To appear
-
R. Lu, X. Lin, X. Liang, and X. S. Shen. Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network. Mobile Netw. Appl., To appear.
-
Mobile Netw. Appl.
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.S.4
-
30
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
M. Matsui, editor, volume 5912 of LNCS
-
T. Okamoto and K. Takashima. Hierarchical predicate encryption for inner-products. In M. Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, volume 5912 of LNCS, pages 214-231. 2009.
-
(2009)
Advances in Cryptology - ASIACRYPT 2009
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
31
-
-
33746340815
-
Efficient identity-based signatures secure in the standard model
-
L. Batten and R. Safavi-Naini, editors, LNCS
-
K. Paterson and J. Schuldt. Efficient identity-based signatures secure in the standard model. In L. Batten and R. Safavi-Naini, editors, Information Security and Privacy, LNCS. 2006.
-
(2006)
Information Security and Privacy
-
-
Paterson, K.1
Schuldt, J.2
-
32
-
-
70350649061
-
Predicate privacy in encryption systems
-
volume 5444 of LNCS
-
E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Theory of Cryptography, volume 5444 of LNCS, pages 457-473. 2009.
-
(2009)
Theory of Cryptography
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
33
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
DOI 10.1109/SP.2007.29, 4223238, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig. Multidimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, SP'07, pages 350-364, 2007. (Pubitemid 47432540)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
34
-
-
49049104392
-
Delegating capabilities in predicate encryption systems
-
E. Shi and B. Waters. Delegating capabilities in predicate encryption systems. In ICALP'08, pages 560-578, 2008.
-
(2008)
ICALP'08
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
36
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. In Proc. of ICDCS'10, 2010.
-
(2010)
Proc. of ICDCS'10
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
37
-
-
33750247597
-
Privacy-preserving queries on encrypted data
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving queries on encrypted data. In Proc. of ESORICS'06, pages 479-495, 2006. (Pubitemid 44609873)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
38
-
-
80051874002
-
Defending against key abuse attacks in KP-ABE enabled broadcast systems
-
S. Yu, K. Ren, W. Lou, and J. Li. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In SecureComm'09.
-
SecureComm'09
-
-
Yu, S.1
Ren, K.2
Lou, W.3
Li., J.4
-
39
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In IEEE INFOCOM'10, 2010.
-
(2010)
IEEE INFOCOM'10
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
40
-
-
80051906335
-
Peksrand: Providing predicate privacy in public-key encryption with keyword search
-
B. Zhu, B. Zhu, and K. Ren. Peksrand: Providing predicate privacy in public-key encryption with keyword search. Cryptology ePrint Archive, Report 2010/466, 2010.
-
(2010)
Cryptology EPrint Archive, Report 2010/466
-
-
Zhu, B.1
Zhu, B.2
Ren, K.3
|