-
1
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Advances in Cryptology, CRYPTO'07
-
M. Bellare, A. Boldyreva, and A. ONeill, Deterministic and efficiently searchable encryption, Advances in Cryptology, CRYPTO'07, LNCS 4622, pp. 535-552, 2007.
-
(2007)
LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
Oneill, A.3
-
2
-
-
35048901123
-
Public key encryption with keyword search
-
Advances in Cryptology, EUROCRYPT'04
-
D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, Public key encryption with keyword search, Advances in Cryptology, EUROCRYPT'04, LNCS 3027, pp. 506-522, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
3
-
-
51849127804
-
Derministic encryption: Definitional equivalences and constructions without random oracles
-
Advances in Cryptology, CRYPTO'08
-
M. Bellare, M. Fischlin, A. O'Neill and T. Ristenpart, Derministic encryption: definitional equivalences and constructions without random oracles, Advances in Cryptology, CRYPTO'08, LNCS 5157, pp. 360-378, 2008.
-
(2008)
LNCS
, vol.5157
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O'neill, A.3
Ristenpart, T.4
-
4
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Theory of Cryptography, TCC'07
-
D. Boneh and B.Waters, Conjunctive, subset, and range queries on encrypted data, Theory of Cryptography, TCC'07, LNCS 4392, pp. 535-554, 2007.
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, Proceedings of the 13th ACM conference on Computer and Communications Security, CCS'06, pp. 88-92, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 88-92
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
6
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Applied Cryptography And Network Security, ACNS'05
-
Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Applied Cryptography And Network Security, ACNS'05, LNCS 3531, pp. 391-421, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 391-421
-
-
Chang, Y.1
Mitzenmacher, M.2
-
7
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, no. 3, pp. 431-473, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
8
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, Fuzzy keyword search over encrypted data in cloud computing, Proceedings of the 29th Annual IEEE International Conference on Computer Communications, INFOCOM'10, pp. 1-5, 2010.
-
(2010)
Proceedings of the 29th Annual IEEE International Conference on Computer Communications, INFOCOM'10
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
9
-
-
74049149270
-
Secure anonymous database search
-
M. Raykova, B. Vo, S. Bellovin and T. Malkin, Secure anonymous database search, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW'09, pp. 115-126, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW'09
, pp. 115-126
-
-
Raykova, M.1
Vo, B.2
Bellovin, S.3
Malkin, T.4
-
10
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner and A. Perrig, Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P'00, pp. 44-55, 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P'00
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
11
-
-
74049138993
-
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
-
A. Yun, C. Shi and Y. Kim, On protecting integrity and confidentiality of cryptographic file system for outsourced storage, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW'09, pp. 67-76, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW'09
, pp. 67-76
-
-
Yun, A.1
Shi, C.2
Kim, Y.3
|