-
2
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D.X. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security and Privacy, pp. 44-55, 2000
-
(2000)
Proc IEEE Symp. Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
R. Curtmola et al., "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 79-88, 2006 (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
-
J.W. Byun et al., "Offline Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data," Proc. Third VLDB Int'l Conf. Secure Data Management, pp. 75-83, 2006 (Pubitemid 44699624)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4165 LNCS
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
9
-
-
33746248713
-
Public key encryption with conjunctive field keyword search
-
D.J. Park, K. Kim, and P.J. Lee, "Public Key Encryption with Conjunctive Field Keyword Search," Proc. Fifth Int'l Conf. Information Security Applications (WISA '04), pp. 73-86, 2004
-
(2004)
Proc. Fifth Int'l Conf. Information Security Applications (WISA '04)
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
10
-
-
58249100325
-
Constructing peks schemes secure against keyword guessing attacks is possible?
-
I.R. Jeong et al., "Constructing PEKS Schemes Secure against Keyword Guessing Attacks Is Possible?" Computer Comm., vol. 32, no. 2, pp. 394-396, 2009
-
(2009)
Computer Comm
, vol.32
, Issue.2
, pp. 394-396
-
-
Jeong, I.R.1
-
12
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
M. Abdalla et al., "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions," Proc. Ann. Int'l Advances in Cryptology (CRYPTO '05), pp. 205-222, 2005 (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
15
-
-
77952048540
-
Anonymity from asymmetry: New constructions for anonymous hibe
-
L. Ducas, "Anonymity from Asymmetry: New Constructions for Anonymous Hibe," Proc. Int'l Conf. Topics in Cryptology (CT-RSA '10), pp. 148-164, 2010
-
(2010)
Proc. Int'l Conf. Topics in Cryptology (CT-RSA '10)
, pp. 148-164
-
-
Ducas, L.1
-
16
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Sept
-
C.-I. Fan, L.-Y. Huang, and P.-H. Ho, "Anonymous Multireceiver Identity-Based Encryption," IEEE Trans. Computers, vol. 59, no. 9, pp. 1239-1249, Sept. 2010
-
(2010)
IEEE Trans. Computers
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, C.-I.1
Huang, L.-Y.2
Ho, P.-H.3
-
17
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, and F. Monrose, "Achieving Efficient Conjunctive Keyword Searches over Encrypted Data," Proc. Seventh Int'l Conf. Information and Comm. Security (ICICS '05), pp. 414-426, 2005
-
(2005)
Proc. Seventh Int'l Conf. Information and Comm. Security (ICICS '05)
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
18
-
-
35248839565
-
Efficient conjunctive keyword-searchable encryption
-
DOI 10.1109/AINAW.2007.166, 4221094, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
E.-K. Ryu and T. Takagi, "Efficient Conjunctive Keyword-Searchable Encryption," Proc. 21st Int'l Conf. Advanced Information Networking and Applications Workshops (AINAW '07), pp. 409-414, 2007 (Pubitemid 47565419)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.2
, pp. 409-414
-
-
Ryu, E.-K.1
Takagi, T.2
-
19
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y.H. Hwang and P.J. Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System," Proc. Pairing Based Cryptography Conf., pp. 2-22, 2007
-
(2007)
Proc. Pairing Based Cryptography Conf
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
20
-
-
38049001725
-
Anonymous multi-attribute encryption with range query and conditional decryption
-
Carnegie Mellon Univ
-
J. Bethencourt et al., "Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption," Technical Report CMU-CS-06-135, Carnegie Mellon Univ., 2006
-
(2006)
Technical Report CMU-CS-06-135
-
-
Bethencourt, J.1
-
22
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," Proc. Fourth Conf. Theory of Cryptography (TCC '07), pp. 535-554, 2007
-
(2007)
Proc. Fourth Conf. Theory of Cryptography (TCC '07)
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
24
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Sept
-
A.J. Menezes, T. Okamoto, and S.A. Vanstone, "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," IEEE Trans. Information Theory, vol. 39, no. 5, pp. 1639-1646, Sept. 1993
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
25
-
-
0032649638
-
The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
July
-
G. Frey, M. Muller, and H.-G. Ruck, "The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems," IEEE Trans. Information Theory, vol. 45, no. 5, pp. 1717-1719, July 1999
-
(1999)
IEEE Trans. Information Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Muller, M.2
Ruck, H.-G.3
-
26
-
-
74949125309
-
Moving beyond kucera and francis:A critical evaluation of current
-
Word Frequency Norms and the Introduction of a New and Improved Word Frequency Measure for American English
-
M. Brysbaert and B. New, "Moving Beyond Kucera and Francis:a Critical Evaluation of Current Word Frequency Norms and the Introduction of a New and Improved Word Frequency Measure for American English," Behavior Research Methods, vol. 49, no. 4, pp. 977-990, 2009
-
(2009)
Behavior Research Methods
, vol.49
, Issue.4
, pp. 977-990
-
-
Brysbaert, M.1
New, B.2
-
28
-
-
0036559175
-
Using internet search engines to estimate
-
Word Frequency
-
I.V. Blair, G.R. Urland, and J.E. Ma, "Using Internet Search Engines to Estimate Word Frequency," Behavior Research Methods Instruments and Computers, vol. 34, no. 2, pp. 286-290, 2002
-
(2002)
Behavior Research Methods Instruments and Computers
, vol.34
, Issue.2
, pp. 286-290
-
-
Blair, I.V.1
Urland, G.R.2
Ma, J.E.3
|