-
1
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Springer
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Cloud computing. Springer, 2009, pp. 157-166
-
(2009)
Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
3
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 2012
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
4
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proceedings of ACM ASIACCS, 2013, pp. 71-82
-
(2013)
Proceedings of ACM ASIACCS
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
5
-
-
84897586040
-
Towards secure multi-keyword top-k retrieval over encrypted cloud data
-
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, "Towards secure multi-keyword top-k retrieval over encrypted cloud data," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239-250, 2013
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
-
6
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, 2014
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
ACM
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proceedings of the ACM conference on Computer and communications security. ACM, 2012, pp. 965-976
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
9
-
-
79960005023
-
Privacy-preserving access of outsourced data via oblivious ram simulation
-
Springer
-
M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious ram simulation," in Automata, Languages and Programming. Springer, 2011, pp. 576-587
-
(2011)
Automata, Languages and Programming
, pp. 576-587
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
10
-
-
84883411598
-
Dynamic proofs of retrievability via oblivious ram
-
Springer
-
D. Cash, A. Küpc ü, and D. Wichs, "Dynamic proofs of retrievability via oblivious ram," in Advances in Cryptology-EUROCRYPT. Springer, 2013, pp. 279-295
-
(2013)
Advances in Cryptology-EUROCRYPT
, pp. 279-295
-
-
Cash, D.1
Küpcü, A.2
Wichs, D.3
-
11
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proceedings of IEEE INFOCOM, 2011, pp. 829-837
-
(2011)
Proceedings of IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
13
-
-
38049021884
-
Cryptography from anonymity
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Cryptography from anonymity," in 47th Annual IEEE Symposium on Foundations of Computer Science, 2006, pp. 239-248
-
(2006)
47th Annual IEEE Symposium on Foundations of Computer Science
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
14
-
-
0002848777
-
Exploring the similarity space
-
J. Zobel and A. Moffat, "Exploring the similarity space," in ACM SIGIR Forum, vol. 32, no. 1, 1998, pp. 18-34
-
(1998)
ACM SIGIR Forum
, vol.32
, Issue.1
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
-
15
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in Proceedings of ACM SIGMOD International Conference on Management of data, 2009, pp. 139-152
-
(2009)
Proceedings of ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
16
-
-
84949194630
-
A simple algebraic representation of rijndael
-
Springer
-
N. Ferguson, R. Schroeppel, and D. Whiting, "A simple algebraic representation of rijndael," in Selected Areas in Cryptography. Springer, 2001, pp. 103-111
-
(2001)
Selected Areas in Cryptography
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
17
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in IEEE Symposium on Security and Privacy (S&P), 2000, pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy (S&P)
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
|