-
1
-
-
84893753996
-
-
AOL Search-log. < http://www.gregsadetsky.com/aol-data/ >.
-
AOL Search-log
-
-
-
2
-
-
78651468316
-
-
Google Trends. < http://www.google.com/trends/ >.
-
Google Trends
-
-
-
3
-
-
84893798495
-
-
Sogou Search-log. < http://www.sogou.com/labs/dl/q-e.html/ >.
-
Sogou Search-log
-
-
-
4
-
-
84874189347
-
-
Stopword List. < http://www.ranks.nl/resources/stopwords.html/ >.
-
Stopword List
-
-
-
5
-
-
45749099677
-
-
Enron Email Dataset, 2009. < http://www.cs.cmu.edu/enron/ >.
-
(2009)
Enron Email Dataset
-
-
-
6
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
Lecture Notes in Computer Science Springer
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions Advances in Cryptology - CRYPTO'05 Lecture Notes in Computer Science vol. 3621 2005 Springer 205 222
-
(2005)
Advances in Cryptology - CRYPTO'05
, vol.3621 VOL.
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B.H. Bloom Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 7 1970 422 426
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
9
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Lecture Notes in Computer Science Springer
-
Y.-C. Chang, and M. Mitzenmacher Privacy preserving keyword searches on remote encrypted data Applied Cryptography and Network Security (ACNS'05) Lecture Notes in Computer Science vol. 3531 2005 Springer 391 421
-
(2005)
Applied Cryptography and Network Security (ACNS'05)
, vol.3531 VOL.
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
10
-
-
78650834524
-
Structured encryption and controlled disclosure
-
Lecture Notes in Computer Science Springer
-
M. Chase, and S. Kamara Structured encryption and controlled disclosure A dvances in Cryptology - ASIACRYPT'10 Lecture Notes in Computer Science vol. 6477 2010 Springer 577 594
-
(2010)
A Dvances in Cryptology - ASIACRYPT'10
, vol.6477 VOL.
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
11
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions J. Comput. Sec. 19 5 2011 895 934
-
(2011)
J. Comput. Sec.
, vol.19
, Issue.5
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
84876842378
-
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
-
L. Fang, W. Susilo, C. Ge, and J. Wang Public key encryption with keyword search secure against keyword guessing attacks without random oracle Inform. Sci. 238 2013 221 241
-
(2013)
Inform. Sci.
, vol.238
, pp. 221-241
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
14
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich, and R. Ostrovsky Software protection and simulation on oblivious rams J. ACM 43 3 1996 431 473
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
M.S. Islam, M. Kuzu, M. Kantarcioglu, Access pattern disclosure on searchable encryption: ramification, attack and mitigation, in: Network and Distributed System Security Symposium (NDSS'12), 2012.
-
(2012)
Network and Distributed System Security Symposium (NDSS'12)
-
-
Islam, M.S.1
Kuzu, M.2
Kantarcioglu, M.3
-
16
-
-
77956137294
-
Cryptographic cloud storage
-
Lecture Notes in Computer Science Springer
-
S. Kamara, and K. Lauter Cryptographic cloud storage Financial Cryptography Workshops Lecture Notes in Computer Science 6054 2010 Springer 136 149
-
(2010)
Financial Cryptography Workshops
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
17
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, T. Roeder, Dynamic searchable symmetric encryption, in: ACM Conference on Computer and Communications Security (CCS'12), 2012, pp. 965-976.
-
(2012)
ACM Conference on Computer and Communications Security (CCS'12)
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
18
-
-
84864234736
-
Efficient similarity search over encrypted data
-
M. Kuzu, M.S. Islam, M. Kantarcioglu, Efficient similarity search over encrypted data, in: IEEE International Conference on Data Engineering (ICDE'12), 2012, pp. 1156-1167.
-
(2012)
IEEE International Conference on Data Engineering (ICDE'12)
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
20
-
-
84861580700
-
Generic construction of designated tester public-key encryption with keyword search
-
H.S. Rhee, J.H. Park, and D.H. Lee Generic construction of designated tester public-key encryption with keyword search Inform. Sci. 205 2012 93 109
-
(2012)
Inform. Sci.
, vol.205
, pp. 93-109
-
-
Rhee, H.S.1
Park, J.H.2
Lee, D.H.3
-
21
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, H. Li, Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, in: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS'13), 2013, pp. 71-82.
-
(2013)
ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS'13)
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
22
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searching on encrypted data, in: IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
23
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans. Parallel Distrib. Syst. 23 8 2012 1467 1479
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
24
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, K.M.R. Urs, Achieving usable and privacy-assured similarity search over outsourced cloud data, in: IEEE INFOCOM, 2012, pp. 451-459.
-
(2012)
IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
25
-
-
84863181194
-
Multi-user privacy keyword search for cloud computing
-
Y. Yang, H. Lu, J. Weng, Multi-user privacy keyword search for cloud computing, in: IEEE International Conference on Cloud Computing Technology and Science (CloudCom'11), 2011, pp. 264-271.
-
(2011)
IEEE International Conference on Cloud Computing Technology and Science (CloudCom'11)
, pp. 264-271
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
|