-
1
-
-
84929910782
-
Privacy-preserving keyword search over encrypted data in cloud computing
-
S. Jajodia K. Kant P. Samarati A. Singhal V. Swarup C. Wang Springer New York
-
[1] Sun, W., Lou, W., Hou, Y.T., Li, H., Privacy-preserving keyword search over encrypted data in cloud computing. Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C., (eds.) Secure Cloud Computing 2014, 2014, Springer, New York, 189–212.
-
(2014)
Secure Cloud Computing 2014
, pp. 189-212
-
-
Sun, W.1
Lou, W.2
Hou, Y.T.3
Li, H.4
-
2
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE Computer Society Press
-
[2] Song, D.X., Wagner, D., Perrig, A., Practical techniques for searches on encrypted data. 2000 IEEE Symposium on Security and Privacy, 2000, IEEE Computer Society Press, 44–55.
-
(2000)
2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
C. Cachin J.L. Camenisch Springer Heidelberg
-
[3] Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. Cachin, C., Camenisch, J.L., (eds.) EUROCRYPT 2004 LNCS, vol. 3027, 2004, Springer, Heidelberg, 506–522.
-
(2004)
EUROCRYPT 2004, LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
84983216850
-
-
Secure indexes. Cryptology ePrint Archive, Report 2003/216
-
[4] E.-J. Goh, Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/.
-
(2003)
-
-
Goh, E.-J.1
-
5
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
[5] Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13:7 (1970), 422–426.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
J. Ioannidis A. Keromytis M. Yung Springer Heidelberg
-
[6] Chang, Y.C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data. Ioannidis, J., Keromytis, A., Yung, M., (eds.) ACNS 2005 LNCS, vol. 3531, 2005, Springer, Heidelberg, 442–455.
-
(2005)
ACNS 2005, LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
7
-
-
34547240272
-
Searchable symmetric encryption: improved definitions and efficient constructions
-
ACM
-
[7] Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R., Searchable symmetric encryption: improved definitions and efficient constructions. ACM CCS 2006, 2006, ACM, 79–88.
-
(2006)
ACM CCS 2006
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
85178119595
-
Dynamic searchable encryption in very large databases: Data structures and implementation
-
[8] Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M., Steiner, M., Dynamic searchable encryption in very large databases: Data structures and implementation. NDSS’14, 2014.
-
(2014)
NDSS’14
-
-
Cash, D.1
Jaeger, J.2
Jarecki, S.3
Jutla, C.4
Krawczyk, H.5
Roşu, M.6
Steiner, M.7
-
9
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
ACM
-
[9] Kamara, S., Papamanthou, C., Roeder, T., Dynamic searchable symmetric encryption. ACM CCS 2012, 2012, ACM, 965–976.
-
(2012)
ACM CCS 2012
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
10
-
-
85173019558
-
Practical dynamic searchable encryption with small leakage
-
[10] Stefanov, E., Papamanthou, C., Shi, E., Practical dynamic searchable encryption with small leakage. NDSS’14, 2014.
-
(2014)
NDSS’14
-
-
Stefanov, E.1
Papamanthou, C.2
Shi, E.3
-
11
-
-
78650834524
-
Structured encryption and controlled disclosure
-
M. Abe Springer Heidelberg
-
[11] Chase, M., Kamara, S., Structured encryption and controlled disclosure. Abe, M., (eds.) ASIACRYPT 2010 LNCS, vol. 6477, 2010, Springer, Heidelberg, 577–594.
-
(2010)
ASIACRYPT 2010, LNCS
, vol.6477
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
12
-
-
84889073373
-
Outsourced symmetric private information retrieval
-
ACM
-
[12] Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.C., Steiner, M., Outsourced symmetric private information retrieval. ACM CCS 2013, 2013, ACM, 875–887.
-
(2013)
ACM CCS 2013
, pp. 875-887
-
-
Jarecki, S.1
Jutla, C.2
Krawczyk, H.3
Roşu, M.C.4
Steiner, M.5
-
13
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
M. Jakobsson M. Yung J. Zhou Springer Heidelberg
-
[13] Golle, P., Staddon, J., Waters, B.R., Secure conjunctive keyword search over encrypted data. Jakobsson, M., Yung, M., Zhou, J., (eds.) ACNS 2004 LNCS, vol. 3089, 2004, Springer, Heidelberg, 31–45.
-
(2004)
ACNS 2004, LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
14
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
R. Canetti J.A. Garay Springer Heidelberg
-
[14] Cash, D., Jarecki, S., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M., Steiner, M., Highly-scalable searchable symmetric encryption with support for boolean queries. Canetti, R., Garay, J.A., (eds.) CRYPTO 2013 LNCS, vol. 8042, 2013, Springer, Heidelberg, 353–373.
-
(2013)
CRYPTO 2013, LNCS
, vol.8042
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jaeger, J.3
Jarecki, S.4
Jutla, C.5
Krawczyk, H.6
Roşu, M.7
Steiner, M.8
-
15
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
IEEE
-
[15] Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W., Fuzzy keyword search over encrypted data in cloud computing. INFOCOM 2010, 2010, IEEE, 1–5.
-
(2010)
INFOCOM 2010
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
16
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over out-sourced cloud data
-
IEEE
-
[16] Wang, C., Ren, K., Yu, S., Mahendra, K., Achieving usable and privacy-assured similarity search over out-sourced cloud data. Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM’12, 2012, IEEE, 451–459.
-
(2012)
Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM’12
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Mahendra, K.4
-
17
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
[17] Cao, N., Wang, C., Li, M., Ren, K., Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25:1 (2014), 222–233.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
18
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
B.S. Kaliski Springer Heidelberg
-
[18] Biham, E., Shamir, A., Differential fault analysis of secret key cryptosystems. Kaliski, B.S., (eds.) CRYPTO 1997 LNCS, vol. 1294, 1997, Springer, Heidelberg, 513–525.
-
(1997)
CRYPTO 1997, LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
19
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
in: USENIX Security Symposium 2008
-
[19] J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, E.W. Felten, Lest we remember: Cold boot attacks on encryption keys, in: USENIX Security Symposium 2008, 2008, pp. 45-60.
-
(2008)
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
20
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
N. Koblitz Springer Heidelberg
-
[20] Koccher, P.C., Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. Koblitz, N., (eds.) CRYPTO 1996 LNCS, vol. 1109, 1996, Springer, Heidelberg, 104–113.
-
(1996)
CRYPTO 1996, LNCS
, vol.1109
, pp. 104-113
-
-
Koccher, P.C.1
-
21
-
-
84939573910
-
Differential power analysis
-
M. Wiener Springer Heidelberg
-
[21] Kocher, P.C., Jaffe, J., Jun, B., Differential power analysis. Wiener, M., (eds.) CRYPTO 1999 LNCS, vol. 1666, 1999, Springer, Heidelberg, 388–397.
-
(1999)
CRYPTO 1999, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
22
-
-
78650238574
-
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
-
in: E-smart 2001
-
[22] J.-J. Quisquater, D. Samyde, Electromagnetic analysis (ema): Measures and counter-measures for smart cards, in: E-smart 2001, 2001, pp. 200–210.
-
(2001)
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
23
-
-
0037144430
-
Physical one-way functions
-
[23] Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N., Physical one-way functions. Science 297 (2002), 2026–2030.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
24
-
-
80051955337
-
Physically uncloneable functions in the universal composition framework
-
P. Rogaway Springer Heidelberg
-
[24] Brzuska, C., Fischlin, M., Schröder, H., Katzenbeisser, S., Physically uncloneable functions in the universal composition framework. Rogaway, P., (eds.) CRYPTO 2011 LNCS, vol. 6841, 2011, Springer, Heidelberg, 51–70.
-
(2011)
CRYPTO 2011, LNCS
, vol.6841
, pp. 51-70
-
-
Brzuska, C.1
Fischlin, M.2
Schröder, H.3
Katzenbeisser, S.4
-
25
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
O. Reingold Springer Heidelberg
-
[25] Akavia, A., Goldwasser, S., Vaikuntanathan, V., Simultaneous hardcore bits and cryptography against memory attacks. Reingold, O., (eds.) TCC 2009 LNCS, vol. 5444, 2009, Springer, Heidelberg, 474–495.
-
(2009)
TCC 2009, LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
26
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
[26] Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38:1 (2008), 97–139.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
27
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
M. Matsui Springer Heidelberg
-
[27] Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P., Memory leakage-resilient encryption based on physically unclonable functions. Matsui, M., (eds.) ASIACRYPT 2009 LNCS, vol. 5912, 2009, Springer, Heidelberg, 685–702.
-
(2009)
ASIACRYPT 2009, LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
28
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
[28] van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V., Fully homomorphic encryption over the integers. Proceedings of EuroCrypt Lecture Notes in Computer Science, vol. 6110, 2010, 24–43.
-
(2010)
Proceedings of EuroCrypt, Lecture Notes in Computer Science
, vol.6110
, pp. 24-43
-
-
van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|