-
3
-
-
70349338509
-
Secure management of SCADA networks
-
December
-
C. Alcaraz, G. Fernandez, R. Roman, A. Balastegui, and J. Lopez, "Secure Management of SCADA Networks," New Trends in Network Management, CEPIS by Novática (ATI, Spain), vol. 9, no. 6, pp. 22-28, December 2008.
-
(2008)
New Trends in Network Management, CEPIS by Novática (ATI, Spain)
, vol.9
, Issue.6
, pp. 22-28
-
-
Alcaraz, C.1
Fernandez, G.2
Roman, R.3
Balastegui, A.4
Lopez, J.5
-
5
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
July
-
C. Alcaraz and J. Lopez, "A security analysis for wireless sensor mesh networks in highly critical systems," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 40, no. 4, pp. 419-428, July 2010.
-
(2010)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
6
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," Journal of the ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
9
-
-
85084161366
-
Tor: The secondgeneration onion router
-
USENIX Assoc.
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," in Proceedings of the 13th conference on USENIX Security Symposium. USENIX Assoc., 2004, pp. 21-21.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
11
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," Information and Communications Security, pp. 414-426, 2005.
-
(2005)
Information and Communications Security
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
12
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88. (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
13
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advances in Cryptology-EUROCRYPT 2004. Springer, 2004, pp. 506-522.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
14
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," Theory of Cryptography, pp. 535-554, 2007.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
15
-
-
38149055585
-
Decryptable searchable encryption
-
T. Fuhr and P. Paillier, "Decryptable searchable encryption," Provable Security, pp. 228-236, 2007.
-
(2007)
Provable Security
, pp. 228-236
-
-
Fuhr, T.1
Paillier, P.2
-
16
-
-
77949627006
-
Searchable encryption with decryption in the standard model
-
D. Hofheinz and E. Weinreb, "Searchable encryption with decryption in the standard model," Cryptology eprint archive, report 2008/423, Tech. Rep., 2008.
-
Cryptology Eprint Archive, Report 2008/423, Tech. Rep.
, pp. 2008
-
-
Hofheinz, D.1
Weinreb, E.2
|