-
1
-
-
84910661856
-
-
http://www.gutenberg.org/.
-
-
-
-
2
-
-
84910616670
-
-
http://invokeit.wordpress.com/frequency-word-lists/.
-
-
-
-
3
-
-
84910658025
-
-
http://www.ciphercloud.com/.
-
-
-
-
4
-
-
84910643869
-
-
http://www.vaultive.com/.
-
-
-
-
6
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology, EUROCRYPT, 2004.
-
(2004)
Advances in Cryptology, EUROCRYPT
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
85178119595
-
Dynamic searchable encryption in very-large databases: Data structures and implementation
-
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Dynamic searchable encryption in very-large databases: Data structures and implementation. In Proceedings of the 21st Network and Distributed System Security Symposium, NDSS, 2014.
-
(2014)
Proceedings of the 21st Network and Distributed System Security Symposium, NDSS
-
-
Cash, D.1
Jaeger, J.2
Jarecki, S.3
Jutla, C.4
Krawczyk, H.5
Rosu, M.6
Steiner, M.7
-
9
-
-
84914174947
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Proceedings of the 33rd Cryptology Conference, CRYPTO, 2013.
-
(2013)
Proceedings of the 33rd Cryptology Conference, CRYPTO
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
10
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6), 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
11
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.5
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
13
-
-
33244488406
-
-
Technical Report 216 IACR Cryptology ePrint Archive
-
E.-J. Goh. Secure indexes. Technical Report 216, IACR Cryptology ePrint Archive, 2003.
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
-
14
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM, 43(3), 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
-
-
Goldreich, O.1
Ostrovsky, R.2
-
16
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM International Conference on Management of Data, SIGMOD, 2002.
-
(2002)
Proceedings of the 2002 ACM International Conference on Management of Data, SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
18
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS, 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium, NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
21
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology, EUROCRYPT, 2008.
-
(2008)
Advances in Cryptology, EUROCRYPT
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
25
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP, 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
26
-
-
85076880634
-
Building web applications on top of encrypted data using mylar
-
R. A. Popa, E. Stark, J. Helfer, S. Valdez, N. Zeldovich, F. Kaashoek, and H. Balakrishnan. Building web applications on top of encrypted data using mylar. In Proceedings of the 11th USENIX Symposium of Networked Systems Design and Implementation, NSDI, 2014.
-
(2014)
Proceedings of the 11th USENIX Symposium of Networked Systems Design and Implementation, NSDI
-
-
Popa, R.A.1
Stark, E.2
Helfer, J.3
Valdez, S.4
Zeldovich, N.5
Kaashoek, F.6
Balakrishnan, H.7
-
27
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Proceedings of the 2007 Symposium on Security and Privacy, S&P, 2007.
-
(2007)
Proceedings of the 2007 Symposium on Security and Privacy, S&P
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
-
31
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path oram: an extremely simple oblivious ram protocol. In Proceedings of the 20th ACM Conference on Computer and Communications Security, CCS, 2013.
-
(2013)
Proceedings of the 20th ACM Conference on Computer and Communications Security, CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
32
-
-
84979674444
-
Computationally efficient searchable symmetric encryption
-
P. van Liesdonk, S. Sedghi, J. Doumen, P. H. Hartel, and W. Jonker. Computationally efficient searchable symmetric encryption. In Proceedings of the 7th VLDB Workshop on Secure Data Management, SDM, 2010.
-
(2010)
Proceedings of the 7th VLDB Workshop on Secure Data Management, SDM
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.H.4
Jonker, W.5
|