-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
London, UK, Springer-Verlag
-
W. Aiello, Y. Ishai, and O. Reingold. Priced oblivious transfer: How to sell digital goods. In EUROCRYPT '01: Proceedings of the International Conference on the TheOlY and Application of Clyptographic Techniques, pages 1 19-135, London, UK, 2001. Springer-Verlag.
-
(2001)
EUROCRYPT '01: Proceedings of the International Conference on the TheOlY and Application of Clyptographic Techniques
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
33749993205
-
Constant-size dynamic k-taa
-
Springer-Verlag
-
M. H. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-taa. In Security and Clyptography for Networks, LNCS vol. 4116, pages 1 1 1-125. Springer-Verlag, 2006.
-
(2006)
Security and Clyptography for Networks, LNCS
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
3
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM Trans. Inf Syst. Secur, 5(3):290-331, 2002.
-
(2002)
ACM Trans. Inf Syst. Secur.
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
4
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
Washington, DC, USA, IEEE Computer Society
-
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
17444370055
-
Public-key encryption with keyword search
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano. Public-key encryption with keyword search. In EUROCRYPT 2004, Advances in Clyptology, 2004. 179
-
(2004)
EUROCRYPT 2004, Advances in Clyptology
, pp. 179
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
May
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. Theory of Clyptography, pages 535-554, May 2007.
-
(2007)
Theory of Clyptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
8
-
-
74049137084
-
Oblivious transfer with access control
-
New York, NY, USA, ACM
-
J. Camenisch, M. Dubovitskaya, and G. Neven. Oblivious transfer with access control. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 13 1-140, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
9
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Berlin, Heidelberg, Springer-Verlag
-
J. Camenisch, G. Neven, and A. Shelat. Simulatable adaptive oblivious transfer. In EUROCRYPT '07: Proceedings of the 26th annual international conference on Advances in Clyptology, pages 573-590, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
EUROCRYPT '07: Proceedings of the 26th annual international conference on Advances in Clyptology
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
Shelat, A.3
-
10
-
-
79960850152
-
Privacy-preserving multikeyword ranked search over encrypted cloud data
-
Shanghai, China
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multikeyword ranked search over encrypted cloud data. In INFOCOM 2011. 30th IEEE international Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pages 829-837, 2011.
-
(2011)
INFOCOM 2011. 30th IEEE international Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
14
-
-
67049100253
-
Controlling access to an oblivious database using stateful anonymous credentials
-
Berlin,Heidelberg, Springer-Verlag
-
S. Coull, M. Green, and S. Hohenberger. Controlling access to an oblivious database using stateful anonymous credentials. In Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Clyptography, pages 501-520,Berlin,Heidelberg, 2009. Springer-Verlag.
-
(2009)
Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Clyptography
, pp. 501-520
-
-
Coull, S.1
Green, M.2
Hohenberger, S.3
-
15
-
-
84857535393
-
-
Cloud Security Alliance
-
Cloud Security Alliance. http://cloudsecurityalliance.org/.
-
-
-
-
16
-
-
33745176972
-
A survey and analysis of Electronic Healthcare Record standards
-
M. Eichelberg, T. Aden, J. Riesmeier, A. Dogac, and G. B. Laleci. A survey and analysis of Electronic Healthcare Record standards. ACM Comput. Surv., 37(4):277-315, 2005.
-
(2005)
ACM Comput. Surv.
, vol.37
, Issue.4
, pp. 277-315
-
-
Eichelberg, M.1
Aden, T.2
Riesmeier, J.3
Dogac, A.4
Laleci, G.B.5
-
18
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY, USA, ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 89-98, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
19
-
-
84937435227
-
The Isd broadcast encryption scheme
-
London, UK, Springer-Verlag
-
D. Halevy and A. Shamir. The Isd broadcast encryption scheme. In Proceedings of the 22nd Annual International Clyptology Conference on Advances in Clyptology, CRYPTO '02, pages 47-60, London, UK, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 22nd Annual International Clyptology Conference on Advances in Clyptology, CRYPTO '02
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
21
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM 2010. 29th IEEE international Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA, pages 441-445, 2010.
-
(2010)
INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
25
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
London, UK, Springer-Verlag
-
D. Naor, M. Naor, and J. B. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of the 21st Annual international Clyptology Conference on Advances in Clyptology, CRYPTO '01, pages 41-62, London, UK, 2001. Springer-Verlag.
-
(2001)
Proceedings of the 21st Annual international Clyptology Conference on Advances in Clyptology, CRYPTO '01
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
26
-
-
34547325357
-
Secure attributebased systems
-
New York, NY, USA, ACM
-
M. Pirretti,P. Traynor,P. McDaniel, and B. Waters. Secure attributebased systems. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 99-1 12, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
28
-
-
24944554962
-
Fuzzy identity-based encryption
-
LNCS 3494, Springer-Verlag
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Euroclypt 2005, LNCS 3494, pages 457-473. Springer-Verlag, 2005.
-
(2005)
Euroclypt 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
30
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Washington, DC, USA, IEEE Computer Society
-
D. X. Song,D. Wagner,and A. Perrigo Practical techniques for searches on encrypted data. In SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 44, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44
-
-
Song, D.X.1
Wagner, D.2
Perrigo, A.3
-
31
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. Distributed Computing Systems, International Conference on, 0:253-262, 2010.
-
(2010)
Distributed Computing Systems International Conference on
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
|