-
1
-
-
84867000770
-
Analyzing response time of batch signing
-
KORKMAZ, T.-TEK, S.: Analyzing response time of batch signing. Journal of Internet Services and Information Security, Vol. 1, 2011, No. 1, pp. 70-85.
-
(2011)
Journal of Internet Services and Information Security
, vol.1
, Issue.1
, pp. 70-85
-
-
Korkmaz T-Tek, S.1
-
2
-
-
84863129241
-
Towards secure cloud computing architecture - A solution based on software protection mechanism
-
FUKUSHIMA, K.-KIYOMOTO, S.-MIYAKE, Y.: Towards secure cloud computing architecture - A solution based on software protection mechanism. Journal of Internet Services and Information Security, Vol. 1, 2011, pp. 4-17.
-
(2011)
Journal of Internet Services and Information Security
, vol.1
, pp. 4-17
-
-
Fukushima, K.-K.1
S-Miyake, Y.2
-
4
-
-
84866980274
-
A server-aided computation protocol revisited for confidentiality of cloud service
-
SHIRAISHI, Y.-MOHRI, M.-FUKUTA, Y.: A server-aided computation protocol revisited for confidentiality of cloud service. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, Vol. 2, 2011, No. 2, pp. 83-94.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications
, vol.2
, Issue.2
, pp. 83-94
-
-
Shiraishi, Y.-M.1
M-Fukuta, Y.2
-
5
-
-
84871774928
-
Data integration in mediated service compositions
-
PAHL, C.-ZHU, Y.: Data integration in mediated service compositions. Computing and Informatics, Vol. 31, 2012, No. 6, pp. 1129-1149.
-
(2012)
Computing and Informatics
, vol.31
, Issue.6
, pp. 1129-1149
-
-
Pahl, C.-Z.Y.1
-
6
-
-
80052103219
-
Design and implementation of an intranet security and access control system in ubi-com
-
LEE, M.-CHO, N. -LEE, K.-KO, K.: Design and implementation of an intranet security and access control system in ubi-com. Computing and Informatics, Vol. 30, 2011, No. 3, pp. 419-428.
-
(2011)
Computing and Informatics
, vol.30
, Issue.3
, pp. 419-428
-
-
Lee, M.1
Cho, N.2
Lee, K.3
Ko, K.4
-
8
-
-
84887910300
-
-
LI, J.-WANG, Q. -WANG, C. -CAO, N. -REN, K.-LOU, W.: Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing Available at http://eprint.iacr.org/2009/593.pdf.
-
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
9
-
-
84871593401
-
-
LI, J.-LI, J. -CHEN, X. -JIA, C.-LIU, Z.: Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. Proc. of NSS 2012, pp. 490-502.
-
(2012)
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. Proc. Of NSS
, pp. 490-502
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Liu, Z.5
-
10
-
-
84870704143
-
A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud
-
LI, J.-JIA, C. -LI, J.-LIU, Z.: A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud. Proc. of INCoS 2012, pp. 1-7.
-
(2012)
Proc. Of INCoS
, pp. 1-7
-
-
Li, J.1
Jia, C.2
Li, J.3
Liu, Z.4
-
11
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Springer-Verlag
-
BELLARE, M.-BOLDYREVA, A.-O'NEILL, A.: Deterministic and efficiently searchable encryption. Proceedings of Crypto 2007, LNSC, Vol. 4622, Springer-Verlag 2007.
-
(2007)
Proceedings of Crypto 2007, LNSC
, vol.4622
-
-
Bellare, M.-B.1
A-O'Neill, A.2
-
16
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
CHANG, Y.-C.-MITZENMACHER, M.: Privacy preserving keyword searches on remote encrypted data. Proc. of ACNS 2005.
-
(2005)
Proc. Of ACNS
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
17
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
CURTMOLA, R.-GARAY, J. A.-KAMARA, S.-OSTROVSKY, R.: Searchable symmetric encryption: improved definitions and efficient constructions. Proc. of ACM CCS 2006.
-
(2006)
Proc. Of ACM CCS
-
-
Curtmola, R.-G.1
A-Kamara, J.2
S-Ostrovsky, R.3
-
18
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
BONEH, D.-WATERS, B.: Conjunctive, subset, and range queries on encrypted data. Proc. of TCC 2007, pp. 535-554.
-
Proc. Of TCC 2007
, pp. 535-554
-
-
Boneh D-Waters, B.1
-
20
-
-
34548774576
-
Multidimensional range query over encrypted data
-
SHI, E.-BETHENCOURT, J. -CHAN, T.-H. -SONG, D.-PERRIG, A.: Multidimensional range query over encrypted data. IEEE Symposium on Security and Privacy 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.3
Song, D.4
Perrig, A.5
-
21
-
-
0003241823
-
Secure multiparty computation of approximations
-
FEIGENBAUM, J.-ISHAI, Y. -MALKIN, T. -NISSIM, K. -STRAUSS, M.-WRIGHT, R. N.: Secure multiparty computation of approximations. Proc. of ICALP'01..
-
Proc. Of ICALP'01
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.N.6
-
24
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
GOYAL, V.-PANDEY, O. -SAHAI, A.-WATERS, B.: Attribute-based encryption for fine-grained access control of encrypted data. CCS '06, ACM 2006, pp. 89-98.
-
(2006)
CCS '06, ACM
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
25
-
-
0002619432
-
Binary codes capable of correcting spurious insertions and deletions of ones
-
LEVENSHTEIN, V.: Binary codes capable of correcting spurious insertions and deletions of ones. Problems of Information Transmission, Vol. 1, 1965, No. 1, pp. 8-17.
-
(1965)
Problems of Information Transmission
, vol.1
, Issue.1
, pp. 8-17
-
-
Levenshtein, V.1
-
28
-
-
85104914015
-
Efficient exact set-similarity joins
-
ARASU, A.-GANTI, V.-KAUSHIK, R.: Efficient exact set-similarity joins. Proc. of VLDB 2006, pp. 918-929.
-
(2006)
Proc. Of VLDB
, pp. 918-929
-
-
Arasu, A.-G.1
V-Kaushik, R.2
-
30
-
-
0014814325
-
Space/Time Trade-Offs in hash coding with allowable errors
-
BLOOM, B.: Space/Time Trade-Offs in hash coding with allowable errors. Communications of the ACM, Vol. 13, 1970, No. 7, pp. 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
|