-
1
-
-
33745134401
-
Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions
-
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Proceedings of advances in cryptology-CRYPTO 2005, pp 205-222.
-
(2005)
In: Proceedings of advances in cryptology-CRYPTO 2005
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
79960257802
-
Cryptography goes to the cloud
-
In: Lee C, Seigneur JM, Park J, Wagner R (eds), Springer, New York
-
Agudo I, Nuñez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. In: Lee C, Seigneur JM, Park J, Wagner R (eds) Secure and trust computing, data management, and applications, communications in computer and information science, vol 187. Springer, New York, pp 190-197.
-
(2011)
Secure and trust computing, data management, and applications, communications in computer and information science
, vol.187
, pp. 190-197
-
-
Agudo, I.1
Nuñez, D.2
Giammatteo, G.3
Rizomiliotis, P.4
Lambrinoudakis, C.5
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
Springer, Interlaken
-
Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of advances in cryptology-EUROCRYPT 2004. Springer, Interlaken, pp 506-522.
-
(2004)
In: Proceedings of advances in cryptology-EUROCRYPT 2004
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer, Amsterdam
-
Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th theory of cryptography conference, vol 4392. Springer, Amsterdam, pp 535-554.
-
(2007)
In: Proceedings of the 4th theory of cryptography conference
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
34547240272
-
Searchable symmetric encryption: improved definition and efficient constrcutions
-
Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constrcutions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, Alexandria, pp 79-88.
-
(2006)
In: Proceedings of the 13th ACM conference on computer and communications security. ACM, Alexandria
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
IEEE, San Diego
-
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications (INFOCOM '10). IEEE, San Diego, pp 441-445.
-
(2010)
In: Proceedings of the 29th IEEE international conference on computer communications (INFOCOM '10)
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
10
-
-
84871593401
-
Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud
-
Springer, New York
-
Li J, Li J, Chen X, Jia C, Liu Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of the 6th international conference on network and system security (NSS '12). Lecture notes in computer science, vol 7645. Springer, New York, pp 490-502.
-
(2012)
In: Proceedings of the 6th international conference on network and system security (NSS '12). Lecture notes in computer science
, vol.7645
, pp. 490-502
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Liu, Z.5
-
11
-
-
84865629030
-
Privacy-preserving cloud database querying
-
Lu Y, Tsudik G (2011) Privacy-preserving cloud database querying. J Internet Serv Inf Secur 1(4): 5-25.
-
(2011)
J Internet Serv Inf Secur
, vol.1
, Issue.4
, pp. 5-25
-
-
Lu, Y.1
Tsudik, G.2
-
12
-
-
24944554962
-
Fuzzy identity-based encryption
-
In: Cramer R (ed), Springer, Berlin/Heidelberg
-
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology-EUROCRYPT 2005, vol 3494. Lecture notes in computer science. Springer, Berlin/Heidelberg, pp 457-473.
-
(2005)
Advances in cryptology-EUROCRYPT 2005, vol 3494. Lecture notes in computer science
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
14
-
-
33644682163
-
Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption
-
Tang PC, Ash JS, Bates DW, Overhage JM, Sands DZ (2006) Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 13(2): 121-126.
-
(2006)
J Am Med Inform Assoc
, vol.13
, Issue.2
, pp. 121-126
-
-
Tang, P.C.1
Ash, J.S.2
Bates, D.W.3
Overhage, J.M.4
Sands, D.Z.5
-
16
-
-
84878002758
-
Anonymous attribute-based encryption supporting efficient decryption test
-
ACM, Hangzhou
-
Zhang Y, Chen X, Li J, Wong DS, Li H (2013) Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security(ASIACCS '13). ACM, Hangzhou, pp 511-516.
-
(2013)
In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security(ASIACCS '13)
, pp. 511-516
-
-
Zhang, Y.1
Chen, X.2
Li, J.3
Wong, D.S.4
Li, H.5
|