-
1
-
-
33744908786
-
Privacy-Enhanced Searches Using Encrypted Bloom Filters
-
ePrint Archive, Report 2006/210
-
Bellovin, S., Cheswick, W.: Privacy-Enhanced Searches Using Encrypted Bloom Filters, Cryptology ePrint Archive, Report 2006/210 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology
-
-
Bellovin, S.1
Cheswick, W.2
-
2
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS 1997, pp. 394-403 (1997)
-
(1997)
FOCS 1997
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
4944252049
-
Universally Composable Signatures, Certification and Authentication
-
ePrint Archive, Report 2003/239
-
Canetti, R.: Universally Composable Signatures, Certification and Authentication, Cryptology ePrint Archive, Report 2003/239 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology
-
-
Canetti, R.1
-
5
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
ePrint Archive, Report 2000/067
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols, Cryptology ePrint Archive, Report 2000/067 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology
-
-
Canetti, R.1
-
6
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security 2006, pp. 79-88 (2006)
-
(2006)
ACM Conference on Computer and Communications Security 2006
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
7
-
-
84865825928
-
-
Full version of the above: ePrint Archive, Report 2006/210
-
Full version of the above: Cryptology ePrint Archive, Report 2006/210 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology
-
-
-
8
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
9
-
-
33244488406
-
Secure Indexes
-
ePrint Archive, Report 2003/216
-
Goh, E.-J.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology
-
-
Goh, E.-J.1
-
10
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy 2000, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy 2000
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
|