-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. J. Cryptology, 21(3):350-391, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. CRYPTO, pages 535-552, 2007.
-
(2007)
CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'neill, A.3
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. EUROCRYPT, pages 506-522, 2004.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. TCC, pages 535-554, 2007.
-
(2007)
TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
5
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. ACNS, pages 442-455, 2005.
-
(2005)
ACNS
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security, 19(5):895-934, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.5
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
10
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. ACNS, pages 31-45, 2004.
-
(2004)
ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
12
-
-
35349020104
-
Yass: Yet another suffix stripper
-
P. Majumder, M. Mitra, S. K. Parui, G. Kole, P. Mitra, and K. Datta. Yass: Yet another suffix stripper. ACM Trans. Inf. Syst., 25(4), 2007.
-
(2007)
ACM Trans. Inf. Syst
, vol.25
, Issue.4
-
-
Majumder, P.1
Mitra, M.2
Parui, S.K.3
Kole, G.4
Mitra, P.5
Datta, K.6
-
15
-
-
84899011392
-
Storing a sparse table with 0(1) worst case access time
-
L. F. Michael, K. Janos, and S. Endre. Storing a sparse table with 0(1) worst case access time. J. ACM, 31(3), 1984.
-
(1984)
J. ACM
, vol.31
, Issue.3
-
-
Michael, L.F.1
Janos, K.2
Endre, S.3
-
18
-
-
34548774576
-
Multidimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig. Multidimensional range query over encrypted data. IEEE Symposium on Security and Privacy, pages 350-364, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
-
20
-
-
58449092891
-
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
-
P. Wang, H. Wang, and J. Pieprzyk. Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. CANS, pages 178-195, 2008.
-
(2008)
CANS
, pp. 178-195
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
21
-
-
0031599183
-
Corpus-based stemming using cooccurrence of word cariants
-
J. Xu and W. B. Croft. Corpus-based stemming using cooccurrence of word cariants. ACM Trans. Inf. Syst., 16(1):61-81, 1998.
-
(1998)
ACM Trans. Inf. Syst.
, vol.16
, Issue.1
, pp. 61-81
-
-
Xu, J.1
Croft, W.B.2
|