-
2
-
-
38049138213
-
Public key encryption that allows pir queries
-
volume 4622 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. Skeith. Public key encryption that allows pir queries. In Advances in Cryptology - CRYPTO 2007, volume 4622 of Lecture Notes in Computer Science, pages 50-67. Springer Berlin / Heidelberg, 2007.
-
(2007)
Advances in Cryptology - CRYPTO 2007
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
3
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
4
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Y.-C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Applied Cryptography and Network Security, pages 442-455. Springer, 2005. (Pubitemid 41422132)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
6
-
-
0032201622
-
Private information retrieval
-
November
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45:965-981, November 1998.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
8
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and oblivious pseudorandom functions. In Theory of Cryptography Conference - TCC 2005, pages 303-324, 2005. (Pubitemid 41231171)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
9
-
-
79955529260
-
Multi-query computationally-private information retrieval with constant communication rate
-
J. Groth, A. Kiayias, and H. Lipmaa. Multi-query computationally-private information retrieval with constant communication rate. In PKC, pages 107-123, 2010.
-
(2010)
PKC
, pp. 107-123
-
-
Groth, J.1
Kiayias, A.2
Lipmaa, H.3
-
10
-
-
1942420748
-
Oblivious keyword search
-
W. Ogata and K. Kurosawa. Oblivious keyword search. In Journal of Complexity, Vol.20, pages 356-371, 2004. (Pubitemid 38526843)
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
11
-
-
79251555651
-
Efficient computationally private information retrieval from anonymity or trapdoor groups
-
J. T. Trostle and A. Parrish. Efficient computationally private information retrieval from anonymity or trapdoor groups. In ISC'10, pages 114-128, 2010.
-
(2010)
ISC'10
, pp. 114-128
-
-
Trostle, J.T.1
Parrish, A.2
-
12
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
December
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition. SIGCOMM Comput. Commun. Rev., 39:50-55, December 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.39
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
13
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. In ICDCS'10, pages 253-262, 2010.
-
(2010)
ICDCS'10
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
14
-
-
70350676849
-
An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data
-
Springer
-
P. Wang, H. Wang, and J. Pieprzyk. An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In Information Security Applications, Lecture Notes in Computer Science, pages 145-159. Springer, 2009.
-
(2009)
Information Security Applications, Lecture Notes in Computer Science
, pp. 145-159
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
|