-
1
-
-
33745134401
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
-
Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
-
Abdalla, M., et al.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
-
3
-
-
84891941059
-
-
Announcing the Advanced Encryption Standard (AES) November
-
Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197 (November 2001)
-
(2001)
Federal Information Processing Standards Publication
, vol.197
-
-
-
4
-
-
38149068986
-
Deterministic and Efficiently Searchable Encryption
-
Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
-
Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and Efficiently Searchable Encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535-552. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005 Springer, Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
34547240272
-
Searchable Symmetric Encryption: Improved Definitions and Efficient constructions
-
ACM, New York
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient constructions. In: ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security (CCS 2006)
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. of the ACM 43(3), 431-473 (1996)
-
(1996)
J. of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
10
-
-
84891923062
-
Security Notions for Searchable Symmetric Encryption with Extra Multiple Documents
-
in Japanese
-
Hirano, T., Mori, T., Hattori, M., Ito, T., Matsuda, N., Kawai, Y., Sakai, Y., Ohta, K.: Security Notions for Searchable Symmetric Encryption with Extra Multiple Documents. In: The 29th Symposium on Cryptography and Information Security, SCIS 2012, 2B3-1 (2012) (in Japanese)
-
(2012)
The 29th Symposium on Cryptography and Information Security, SCIS 2012
-
-
Hirano, T.1
Mori, T.2
Hattori, M.3
Ito, T.4
Matsuda, N.5
Kawai, Y.6
Sakai, Y.7
Ohta, K.8
-
12
-
-
77956137294
-
Cryptographic Cloud Storage
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
13
-
-
84865472153
-
-
MSR Tech Report no. MSR-TR-2011-58. Microsoft, Redmond
-
Kamara, S., Papamanthou, C., Roeder, T.: CS2: A searchable cryptographic cloud storage system. MSR Tech Report no. MSR-TR-2011-58. Microsoft, Redmond (2011)
-
(2011)
CS2: A Searchable Cryptographic Cloud Storage System
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
15
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
Jonker, W., Petković, M. (eds.) SDM 2010 Springer, Heidelberg
-
van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 87-100. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6358
, pp. 87-100
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
16
-
-
84891959072
-
-
The Institute for Language, Speech and Hearing
-
Moby Word Lists, The Institute for Language, Speech and Hearing, http://icon.shef.ac.uk/Moby/
-
Moby Word Lists
-
-
-
17
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: Proc. of 2000 IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
-
(2000)
Proc. of 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
|