-
1
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," in IEEE Symposium on Security and Privacy, pp. 44-55, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
2
-
-
33244488406
-
-
Cryptology ePrint Archive, Report 2003/216
-
E.-J. Goh, "Secure Indexes." Cryptology ePrint Archive, Report 2003/216.
-
Secure Indexes
-
-
Goh, E.-J.1
-
3
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," in ACNS, pp. 442-455, 2005.
-
(2005)
ACNS
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
4
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Journal of Computer Security, pp. 895-934, 2011.
-
(2011)
Journal of Computer Security
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
5
-
-
78650834524
-
Structured encryption and controlled disclosure
-
M. Chase and S. Kamara, "Structured Encryption and Controlled Disclosure," in ASIACRYPT, pp. 577-594, 2010.
-
(2010)
ASIACRYPT
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
6
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic Searchable Symmetric Encryption," in ACM Conference on Computer and Communications Security (CCS), pp. 965-976, 2012.
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
7
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
S. Kamara and C. Papamanthou, "Parallel and Dynamic Searchable Symmetric Encryption," in Financial Cryptography, pp. 258-274, 2013.
-
(2013)
Financial Cryptography
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
8
-
-
85173019558
-
Practical dynamic searchable encryption with small leakage
-
E. Stefanov, C. Papamanthou, and E. Shi, "Practical Dynamic Searchable Encryption with Small Leakage," in NDSS, 2014.
-
(2014)
NDSS
-
-
Stefanov, E.1
Papamanthou, C.2
Shi, E.3
-
9
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries," in CRYPTO, pp. 353-373, 2013.
-
(2013)
CRYPTO
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.S.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
10
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, pp. 431-473, 1996.
-
(1996)
J ACM
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
11
-
-
1542456902
-
The height of a random binary search tree
-
B. A. Reed, "The Height of a Random Binary Search Tree," J. ACM, vol. 50, no. 3, pp. 306-332, 2003.
-
(2003)
J. ACM
, vol.50
, Issue.3
, pp. 306-332
-
-
Reed, B.A.1
|