-
1
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," in Proc. of IEEE Symposium on Security and Privacy'00, Pages 44-55, 2000
-
(2000)
Proc. of IEEE Symposium on Security and Privacy'00
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
2
-
-
33244488406
-
Secure Indexes
-
Report 2003/216
-
E.-J. Goh, "Secure Indexes," Cryptology ePrint Archive, Report 2003/216, 2003, http://eprint.iacr.org/.
-
(2003)
Cryptology ePrint Archive
-
-
Goh, E.-J.1
-
3
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
DOI 10.1007/s00145-007-9006-6
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, and P. Paillier, "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions," Journal of Cryptology, Volume 21, Number 3, Pages 350-391, 2008. (Pubitemid 351667021)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
4
-
-
38149068986
-
Deterministic and Efficiently Searchable Encryption
-
Proc. of Crypto 2007, Springer-Verlag
-
M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and Efficiently Searchable Encryption," in Proc. of Crypto 2007, Volume 4622 of LNCS. Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4622
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
5
-
-
33746214783
-
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
-
Public Key Infrastructure
-
J. W. Byun, D. H. Lee, and J. Lim, "Efficient Conjunctive Keyword Search on Encrypted Data Storage System," Lecture Notes in Computer Science, Volume 4043, Public Key Infrastructure, Pages 184-196, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4043
, pp. 184-196
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
6
-
-
17444370055
-
Public Key Encryption with Keyword Search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption With Keyword Search," in Proc. of EUROCRYP'04, 2004.
-
Proc. of EUROCRYP'04, 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
38349070353
-
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
-
Cryptology and Network Security
-
R. Zhang, and H. Imai, "Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption," Lecture Notes in Computer Science, Volume 4856, Cryptology and Network Security, Pages 159-174, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4856
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
-
8
-
-
45749087352
-
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
-
Applied Cryptography and Network Security
-
N. Borisov, and S. Mitra, "Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance," Lecture Notes in Computer Science, Volume 5037, Applied Cryptography and Network Security, Pages 373-391, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5037
, pp. 373-391
-
-
Borisov, N.1
Mitra, S.2
-
9
-
-
26844445270
-
Secure Index Search for Groups
-
Trust, Privacy, and Security in Digital Business
-
H.-A. Park, J. W. Byum, and D. H. Lee, "Secure Index Search for Groups," Lecture Notes in Computer Science, Volume 3592, Trust, Privacy, and Security in Digital Business, Pages 128-140, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3592
, pp. 128-140
-
-
Park, H.-A.1
Byum, J.W.2
Lee, D.H.3
-
10
-
-
77953308681
-
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search Over Encrypted Data In Cloud Computing," in Proc of IEEE INFOCOM'10 Mini- Conference, San Diego, CA, USA, 2010
-
Proc of IEEE INFOCOM'10 Mini- Conference, San Diego, CA, USA, 2010
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
11
-
-
80055107187
-
Different Search Strategies on Encrypted Data Compared. Data-Centric Systems and Applications
-
R. Brinkman. "Different Search Strategies on Encrypted Data Compared. Data-Centric Systems and Applications," Security, Privacy, and Trust in Modern Data Management, Part 3, Pages 183-196, 2007.
-
(2007)
Security, Privacy, and Trust in Modern Data Management, Part 3
, pp. 183-196
-
-
Brinkman, R.1
-
12
-
-
0032075067
-
Learning String-Edit Distance
-
E. S. Ristad, and Peter N. Yianilos, "Learning String-Edit Distance," IEEE transaction on pattern analysis and machine intelligence, volume 20, number 5, 1998.
-
(1998)
IEEE Transaction on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.5
-
-
Ristad, E.S.1
Yianilos, P.N.2
-
13
-
-
84912026197
-
-
Link-Assistant.com, Referenced online at
-
Link-Assistant.com, "Stop Words: Words Ignored By Search Engines," Referenced online at http://www.link-assistant.com/seostop-words. html
-
Stop Words: Words Ignored by Search Engines
-
-
|