-
1
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Gener. Comput. Syst. 28 3 2012 583 592
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
2
-
-
84870366061
-
Identity-based data storage in cloud computing
-
Identity-based data storage in cloud computing Future Gener. Comput. Syst. 29 3 2013 673 681
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.3
, pp. 673-681
-
-
-
3
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
J. Ioannidis, A. Keromytis, M. Yung, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
Y.-C. Chang, and M. Mitzenmacher Privacy preserving keyword searches on remote encrypted data J. Ioannidis, A. Keromytis, M. Yung, Applied Cryptography and Network Security Lecture Notes in Computer Science vol. 3531 2005 Springer Berlin Heidelberg 391 421
-
(2005)
Applied Cryptography and Network Security
, vol.3531 VOL.
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
4
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: The 30th International Conference on Distributed Computing Systems, ICDCS'10, 2010, pp. 253-262.
-
(2010)
The 30th International Conference on Distributed Computing Systems, ICDCS'10
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
5
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in: IEEE Conference on Computer Communications, INFOCOM'10, 2010, pp. 1-5.
-
(2010)
IEEE Conference on Computer Communications, INFOCOM'10
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
6
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, in: IEEE Conference on Computer Communications, INFOCOM'11, 2011, pp. 829-837.
-
(2011)
IEEE Conference on Computer Communications, INFOCOM'11
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
33749971600
-
-
U.S. Department of Commerce, Washington, DC, USA, Jan.
-
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, Washington, DC, USA, Jan. 1977.
-
(1977)
National Bureau of Standards, Data Encryption Standard
-
-
-
8
-
-
84888360710
-
-
Bonn, Germany, May 10-12, in: Lecture Notes in Computer Science
-
H. Dobbertin, V. Rijmen, A. Sowa, Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, in: Lecture Notes in Computer Science, 2004.
-
(2004)
Advanced Encryption Standard - AES: 4th International Conference, AES 2004
-
-
Dobbertin, H.1
Rijmen, V.2
Sowa, A.3
-
9
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS'06 2006 ACM New York, NY, USA 89 98 (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07, 2007, pp. 195-203.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
15
-
-
77954647813
-
Generalized distances between rankings
-
R. Kumar, S. Vassilvitskii, Generalized distances between rankings, in: WWW, 2010, pp. 571-580.
-
(2010)
WWW
, pp. 571-580
-
-
Kumar, R.1
Vassilvitskii, S.2
-
16
-
-
0000159640
-
A statistical approach to mechanized encoding and searching of literary information
-
H.P. Luhn A statistical approach to mechanized encoding and searching of literary information IBM J. Res. Dev. 1 4 1957 309 317
-
(1957)
IBM J. Res. Dev.
, vol.1
, Issue.4
, pp. 309-317
-
-
Luhn, H.P.1
-
17
-
-
0035024125
-
Heavy tails, generalized coding, and optimal Web layout
-
X.Z. Jie, J. Yu, and J. Doyle Heavy tails, generalized coding, and optimal web layout IEEE INFOCOM 2001 2001 IEEE Press 1617 1626 (Pubitemid 32485808)
-
(2001)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1617-1626
-
-
Zhu, X.1
Yu, J.2
Doyle, J.3
-
18
-
-
36448940444
-
Heavy-tailed distributions and multi-keyword queries
-
DOI 10.1145/1277741.1277855, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07
-
S. Chaudhuri, K. Church, A.C. König, and L. Sui Heavy-tailed distributions and multi-keyword queries The 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07 2007 ACM New York, NY, USA 663 670 (Pubitemid 350165017)
-
(2007)
Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07
, pp. 663-670
-
-
Chaudhuri, S.1
Church, K.2
Konig, A.C.3
Sui, L.4
-
19
-
-
77956137294
-
Cryptographic cloud storage
-
R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Seb, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
S. Kamara, and K. Lauter Cryptographic cloud storage R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Seb, Financial Cryptography and Data Security Lecture Notes in Computer Science vol. 6054 2010 Springer Berlin Heidelberg 136 149
-
(2010)
Financial Cryptography and Data Security
, vol.6054 VOL.
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
20
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Security and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE Symposium on, 2000, pp. 44-55.
-
(2000)
Security and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE Symposium
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
22
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06 2006 ACM New York, NY, USA 79 88 (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
23
-
-
70749116607
-
An efficient privacy preserving keyword search scheme in cloud computing
-
Q. Liu, G. Wang, J. Wu, An efficient privacy preserving keyword search scheme in cloud computing, in: International Conference on Computational Science and Engineering, CSE'09, vol. 2, 2009, pp. 715-720.
-
(2009)
International Conference on Computational Science and Engineering, CSE'09
, vol.2
, pp. 715-720
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
24
-
-
35048901123
-
Public key encryption with keyword search
-
C. Cachin, J. Camenisch, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search C. Cachin, J. Camenisch, Advances in Cryptology - EUROCRYPT'04 Lecture Notes in Computer Science vol. 3027 2004 Springer Berlin Heidelberg 506 522
-
(2004)
Advances in Cryptology - EUROCRYPT'04
, vol.3027 VOL.
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
25
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions V. Shoup, Advances in Cryptology, CRYPTO'05 Lecture Notes in Computer Science vol. 3621 2005 Springer Berlin Heidelberg 205 222 (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
26
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
Information Security Applications - 5th International Workshop, WISA 2004
-
D. Park, K. Kim, and P. Lee Public key encryption with conjunctive field keyword search C. Lim, M. Yung, Information Security Applications Lecture Notes in Computer Science vol. 3325 2005 Springer Berlin Heidelberg 73 86 (Pubitemid 41190803)
-
(2005)
Lecture Notes in Computer Science
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
27
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
M. Jakobsson, M. Yung, J. Zhou, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
P. Golle, J. Staddon, and B. Waters Secure conjunctive keyword search over encrypted data M. Jakobsson, M. Yung, J. Zhou, Applied Cryptography and Network Security Lecture Notes in Computer Science vol. 3089 2004 Springer Berlin Heidelberg 31 45
-
(2004)
Applied Cryptography and Network Security
, vol.3089 VOL.
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
28
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
S. Qing, W. Mao, J. Lapez, G. Wang, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
L. Ballard, S. Kamara, and F. Monrose Achieving efficient conjunctive keyword searches over encrypted data S. Qing, W. Mao, J. Lapez, G. Wang, Information and Communications Security Lecture Notes in Computer Science vol. 3783 2005 Springer Berlin Heidelberg 414 426
-
(2005)
Information and Communications Security
, vol.3783 VOL.
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
29
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
S. Vadhan, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
D. Boneh, and B. Waters Conjunctive, subset, and range queries on encrypted data S. Vadhan, Theory of Cryptography Lecture Notes in Computer Science vol. 4392 2007 Springer Berlin Heidelberg 535 554
-
(2007)
Theory of Cryptography
, vol.4392 VOL.
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
31
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
Y. Hwang, and P. Lee Public key encryption with conjunctive keyword search and its extension to a multi-user system T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto, Pairing-Based Cryptography, Pairing 2007 Lecture Notes in Computer Science vol. 4575 2007 Springer Berlin Heidelberg 2 22
-
(2007)
Pairing-Based Cryptography, Pairing 2007
, vol.4575 VOL.
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
32
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in: The Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology, EUROCRYPT '08, 2008, pp. 146-162. (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
33
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
H. Gilbert, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, Advances in Cryptology, EUROCRYPT 2010 Lecture Notes in Computer Science vol. 6110 2010 Springer Berlin Heidelberg 62 91
-
(2010)
Advances in Cryptology, EUROCRYPT 2010
, vol.6110 VOL.
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
34
-
-
70350649061
-
Predicate privacy in encryption systems
-
O. Reingold, Lecture Notes in Computer Science Springer Berlin Heidelberg
-
E. Shen, E. Shi, and B. Waters Predicate privacy in encryption systems O. Reingold, Theory of Cryptography Lecture Notes in Computer Science vol. 5444 2009 Springer Berlin Heidelberg 457 473
-
(2009)
Theory of Cryptography
, vol.5444 VOL.
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
|