-
1
-
-
35048901123
-
Public key encryption with keyword search
-
EUROCRYPT 2004, ser.
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in EUROCRYPT 2004, ser. Lecture Notes in Computer Science, vol. 3027, 2004, pp. 506-522.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
3
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Secure Data Management 2006, ser.
-
J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee, "Off-line keyword guessing attacks on recent keyword search schemes over encrypted data," in Secure Data Management 2006, ser. Lecture Notes in Computer Science, vol. 4165, pp. 75-83.
-
Lecture Notes in Computer Science
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
4
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
M. Abdalla et al., "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," Journal of Cryptology, vol. 21, no. 3, pp. 350-391, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
-
5
-
-
70350649061
-
Predicate privacy in encryption systems
-
6th Theory of Cryptography Conference 2009, ser.
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in 6th Theory of Cryptography Conference 2009, ser. Lecture Notes in Computer Science, vol. 5444, 2009, pp. 457-473.
-
(2009)
Lecture Notes in Computer Science
, vol.5444
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
8
-
-
85062928816
-
Vulnerabilities of passive internet threat monitors
-
Y. Shinoda, K. Ikai, and M. Itoh, "Vulnerabilities of passive internet threat monitors," in USENIX Security Symposium, 2005, pp. 209-224.
-
USENIX Security Symposium, 2005
, pp. 209-224
-
-
Shinoda, Y.1
Ikai, K.2
Itoh, M.3
-
9
-
-
80052147709
-
Peksrand: Providing predicate privacy in public-key encryption with keyword search
-
Report 2010/466
-
B. Zhu, B. Zhu, and K. Ren, "Peksrand: Providing predicate privacy in public-key encryption with keyword search," Cryptology ePrint Archive, Report 2010/466.
-
Cryptology EPrint Archive
-
-
Zhu, B.1
Zhu, B.2
Ren, K.3
-
11
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
22944464423
-
The Enron corpus: A new dataset for email classification research
-
European Conference on Machine Learning 2004, ser.
-
B. Klimt and Y. Yang, "The Enron corpus: A new dataset for email classification research," in European Conference on Machine Learning 2004, ser. Lecture Notes in Computer Science, vol. 3201, 2004, pp. 217-226.
-
(2004)
Lecture Notes in Computer Science
, vol.3201
, pp. 217-226
-
-
Klimt, B.1
Yang, Y.2
-
15
-
-
48649106256
-
SSARES: Secure searchable automated remote email storage
-
A. J. Aviv, M. E. Locasto, S. Potter, and A. D. Keromytis, "SSARES: Secure searchable automated remote email storage," in Computer Security Applications Conference (ACSAC), 2007, pp. 129-139.
-
Computer Security Applications Conference (ACSAC), 2007
, pp. 129-139
-
-
Aviv, A.J.1
Locasto, M.E.2
Potter, S.3
Keromytis, A.D.4
|