-
1
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," S&P 2000, vol. 8, pp. 44-55, 2000.
-
(2000)
S&P 2000
, vol.8
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
2
-
-
84877939257
-
Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking
-
May
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, "Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking," in ASIACCS 2013, May 2013.
-
(2013)
ASIACCS 2013
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, T.6
Li, H.7
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," EUROCRYPTO 2004, pp. 506-522, 2004.
-
(2004)
EUROCRYPTO 2004
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," INFOCOM 2011, pp. 829-837, 2011.
-
(2011)
INFOCOM 2011
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
5
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Pairing 2007, pp. 2-22, 2007.
-
(2007)
Pairing 2007
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
6
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," Theory of Cryptography, vol. 4392, pp. 535-554, 2007.
-
(2007)
Theory of Cryptography
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," ACNS 2004, vol. 3089, pp. 31-45, 2004.
-
(2004)
ACNS 2004
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
8
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," ICDCS 2010, pp. 253-262, 2010.
-
(2010)
ICDCS 2010
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
9
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," ACNS 2005, vol. 3531, pp. 442-455, 2005.
-
(2005)
ACNS 2005
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," CCS 2006, vol. 19, pp. 79-88, 2006.
-
(2006)
CCS 2006
, vol.19
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
March, San Diego, CA, USA
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in IEEE INFOCOM 2010, mini-conference, San Diego, CA, USA, March 2010.
-
(2010)
IEEE INFOCOM 2010, Mini-conference
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
13
-
-
80055115224
-
Fuzzy keyword search on encrypted cloud storage data with small index
-
C. Liu, L. Zhu, L. Li, and Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," ICCCIS 2011, pp. 269-273, 2011.
-
(2011)
ICCCIS 2011
, pp. 269-273
-
-
Liu, C.1
Zhu, L.2
Li, L.3
Tan, Y.4
-
14
-
-
80052398037
-
Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
-
M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," ICDCSW 2011, pp. 273-281, 2011.
-
(2011)
ICDCSW 2011
, pp. 273-281
-
-
Chuah, M.1
Hu, W.2
-
16
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
17
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," SIGMOD 2009, pp. 139-152, 2009.
-
(2009)
SIGMOD 2009
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
18
-
-
79956333848
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Singapore, September 7-9
-
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm 2010, Singapore, September 7-9 2010.
-
(2010)
SecureComm 2010
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
19
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA, USA, March
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM 2010, San Diego, CA, USA, March 2010.
-
(2010)
IEEE INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
20
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," SCG 2004, 2004.
-
(2004)
SCG 2004
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
23
-
-
34548774576
-
Multidimension range query over encrypted data
-
E. Shi, J. Bethencourt, T. h. Hubert, C. Dawn, and S. A. Perrig, "Multidimension range query over encrypted data," S&P 2007, pp. 350-364, 2007.
-
(2007)
S&P 2007
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Hubert, T.3
Dawn, C.4
Perrig, S.A.5
-
24
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," TCC 2009, pp. 457-473, 2009.
-
(2009)
TCC 2009
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
25
-
-
79952511284
-
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
-
N. Attrapadung and B. Libert, "Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation," PKC 2010, vol. 6056, pp. 384-402, 2010.
-
(2010)
PKC 2010
, vol.6056
, pp. 384-402
-
-
Attrapadung, N.1
Libert, B.2
-
26
-
-
84925827178
-
Privacy-preserving logarithmic-time search on encrypted data in cloud
-
Y. Lu, "Privacy-preserving logarithmic-time search on encrypted data in cloud," NDSS 2012, 2012.
-
(2012)
NDSS 2012
-
-
Lu, Y.1
-
27
-
-
84864234736
-
Efficient similarity search over encrypted data
-
M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data," 28th International Conference on Data Engineering, pp. 1156-1167, 2012.
-
(2012)
28th International Conference on Data Engineering
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
|