-
1
-
-
84924742125
-
Draft nist working definition of cloud computing
-
Online at , accessed Aug. 2010
-
P. Mell and T. Grance, "Draft nist working definition of cloud computing," Referenced on Jan. 23rd, 2010 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, accessed Aug. 2010.
-
(2010)
Referenced on Jan. 23rd
-
-
Mell, P.1
Grance, T.2
-
3
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol.23, no.8, pp.1467-1479, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
4
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," Proc. S&P, pp.44-55, 2000.
-
(2000)
Proc. S&P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
5
-
-
84924726716
-
Secure indexes
-
accessed Aug
-
E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, http://eprint.iacr.org/2003/216, accessed Aug. 2013.
-
(2013)
Cryptology EPrint Archive
-
-
Goh, E.-J.1
-
6
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," Proc. ACNS, pp.391-421, 2005.
-
(2005)
Proc. ACNS
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," Proc. ACM CCS, pp.79-88, 2006.
-
(2006)
Proc. ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," Proc. EUROCRYPT, pp.506-522, 2004.
-
(2004)
Proc. EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
9
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, and A. ONeill, "Deterministic and efficiently searchable encryption," Proc. CRYPTO, pp.535-552, 2007.
-
(2007)
Proc. CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
Oneill, A.3
-
10
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA, March
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," Proc. IEEE INFOCOM'10 Mini-Conference, pp.1-5, San Diego, CA, USA, March 2010.
-
(2010)
Proc. IEEE INFOCOM'10 Mini-Conference
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
11
-
-
38049138213
-
Public key encryption that allows pir queries
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W.E.S. III, "Public key encryption that allows pir queries," Proc. CRYPTO, pp.50-67, 2007.
-
(2007)
Proc. CRYPTO
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
-
12
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, "Confidentiality-preserving rank-ordered search," Proc. 2007 ACM Workshop on Storage Security and Survivability, pp.7-12, 2007.
-
(2007)
Proc. 2007 ACM Workshop on Storage Security and Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
13
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k retrieval from a confidential index," Proc. EDBT, pp.439-449, 2009.
-
(2009)
Proc. EDBT
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
14
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," Proc. IEEE INFOCOM, pp.829-837, 2011.
-
(2011)
Proc. IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
15
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT. Hou, H.L, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," Proc. ASIACCS, pp.71-82, 2013.
-
(2013)
Proc. ASIACCS
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.H.L.6
-
16
-
-
84916596197
-
Parallel and dynamic searchable symmetric encryption
-
accessed Aug
-
S. Kamara and C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," Cryptology ePrint Archive, http://eprint. iacr.org/2013/335, accessed Aug. 2013.
-
(2013)
Cryptology EPrint Archive
-
-
Kamara, S.1
Papamanthou, C.2
-
17
-
-
0003756969
-
-
Morgan Kaufmann Publishing, San Francisco May
-
I.H. Witten, A. Moffat, and T.C. Bell, Managing gigabytes: Compressing and indexing documents and images, Morgan Kaufmann Publishing, San Francisco, May 1999.
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
18
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
P. Liesdonk, S. Sedghi, J. Doumen, P. Hartel, and W. Jonker, "Computationally efficient searchable symmetric encryption," Secure Data Management, pp.87-100, 2010.
-
(2010)
Secure Data Management
, pp. 87-100
-
-
Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
19
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B.Waters, "Conjunctive, subset, and range queries on encrypted data," Proc. TCC, pp.535-554, 2007.
-
(2007)
Proc. TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B.R. Waters, "Secure conjunctive keyword search over encrypted data," Proc. ACNS, pp.31-45, 2004.
-
(2004)
Proc. ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
21
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Pairing, pp.2-22, 2007.
-
(2007)
Pairing
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
22
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," Proc. EUROCRYPT, pp.146-162, 2008.
-
(2008)
Proc. EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
84860009960
-
Adaptively attribute-hiding (hierarchical) inner product encryption
-
T. Okamoto and K. Takashima, "Adaptively attribute-hiding (Hierarchical) inner product encryption," Proc. EUROCRYPT, pp.591-608, 2012.
-
(2012)
Proc. EUROCRYPT
, pp. 591-608
-
-
Okamoto, T.1
Takashima, K.2
-
24
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," Proc. TCC, pp.457-473, 2009.
-
(2009)
Proc. TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
26
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," Proc. SIGMOD, pp.139-152, 2009.
-
(2009)
Proc. SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
27
-
-
38049021884
-
Cryptography from anonymity
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Cryptography from anonymity," Proc. 47th Annual IEEE Symposium on Foundations of Computer Science, pp.239-248, 2006.
-
(2006)
Proc. 47th Annual IEEE Symposium on Foundations of Computer Science
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
|