-
1
-
-
84938917813
-
-
Berkeley: University of California
-
Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, A. Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M. Above the clouds: A Berkeley view of cloud computing, Technical Report UCB-EECS-2009-28. Berkeley: University of California; 2009. p. 1-23
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing, Technical Report UCB-EECS-2009-28
, pp. 1-23
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
79952511284
-
Functional encryption for inner product: Achieving constant size cipher text switch adaptive security or support for negation
-
P. Nguyen, D. Pointcheval, Springer Berlin/Heidelberg
-
N. Attrapadung, and B. Li Bert Functional encryption for inner product: Achieving constant size cipher text switch adaptive security or support for negation P. Nguyen, D. Pointcheval, Public Key Cryptography, 6056 LNCS 2010 Springer Berlin/Heidelberg 384 402
-
(2010)
Public Key Cryptography, 6056 LNCS
, pp. 384-402
-
-
Attrapadung, N.1
Li Bert, B.2
-
4
-
-
38149068986
-
Deterministic and efficient searchable encryption
-
A. Menezes, Springer Berlin/Heidelberg
-
M. Bellare, A. Boldyreva, and A.O. Neill Deterministic and efficient searchable encryption A. Menezes, Advances in Cryptology-CRYPTO 2007, 4622 LNCS 2007 Springer Berlin/Heidelberg 535 552
-
(2007)
Advances in Cryptology-CRYPTO 2007, 4622 LNCS
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
Neill, A.O.3
-
5
-
-
67650690965
-
Order-preserving symmetric encryption
-
Springer, Germany
-
Boldyreva A, Chenette N, Lee Y, O'Neill A. Order-preserving symmetric encryption. In: Proceedings of 28th annual international conference on theory and applications of cryptography techniques. Springer, Germany; 2009. p. 224-41
-
(2009)
Proceedings of 28th Annual International Conference on Theory and Applications of Cryptography Techniques
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
7
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou Privacy-preserving multi-keyword ranked search over encrypted cloud data IEEE Trans Parallel Distrib Syst 25 1 2014 222 233
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
10
-
-
85026977525
-
-
Cohen WW. Enron email data set
-
Cohen WW. Enron email data set; 2013 (http://www.cs.cmu.edu/~enron/)
-
(2013)
-
-
-
14
-
-
69949171348
-
Cloud computing and information policy: Computing in a policy cloud?
-
P.T. Jaeger, J. Lin, and J.M. Grimes Cloud computing and information policy: Computing in a policy cloud? J Inform Technol Polit 5 3 2009 269 283
-
(2009)
J Inform Technol Polit
, vol.5
, Issue.3
, pp. 269-283
-
-
Jaeger, P.T.1
Lin, J.2
Grimes, J.M.3
-
15
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
T. Jaeger, and J. Schiffman Outlook: Cloudy with a chance of security challenges and improvements IEEE Secur Priv 8 1 2010 77 80
-
(2010)
IEEE Secur Priv
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
16
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Berlin, Heidelberg
-
Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of 27th annual international conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg; 2008. p. 146-62.
-
(2008)
Proceedings of 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego
-
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of of IEEE 29th international conference on computer communications. San Diego; 2010. p. 441-5.
-
(2010)
Proceedings of of IEEE 29th International Conference on Computer Communications
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
20
-
-
84858038683
-
Secure and efficient privacy preserving keyword searching for cloud services
-
Elsevier
-
Q. Liu, G. Wang, and J. Wu Secure and efficient privacy preserving keyword searching for cloud services J Netw Comput Appl 35 2012 Elsevier 927 933
-
(2012)
J Netw Comput Appl
, vol.35
, pp. 927-933
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
21
-
-
84925827178
-
Privacy-preserving logarithmic- time search on encrypted data in cloud
-
San Diego, California, USA
-
Lu Y. Privacy-preserving logarithmic- time search on encrypted data in cloud. In: Proceedings of 19th NDSS. San Diego, California, USA; 2012.
-
(2012)
Proceedings of 19th NDSS
-
-
Lu, Y.1
-
23
-
-
1942420748
-
Oblivious keyword search
-
W. Ogata, and K. Kurosawa Oblivious keyword search J Complex 20 2004 356 371
-
(2004)
J Complex
, vol.20
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
24
-
-
84897629494
-
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
-
Springer
-
C. Orencik, and E. Savas An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking Parallel and Distributed Databases 32 2014 Springer 119 160
-
(2014)
Parallel and Distributed Databases
, vol.32
, pp. 119-160
-
-
Orencik, C.1
Savas, E.2
-
26
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
California
-
Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proceedings of IEEE symposium on security and privacy. California; 2007. p. 350-64.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
29
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans Parallel Distrib Syst 23 8 2012 1467 1479
-
(2012)
IEEE Trans Parallel Distrib Syst
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
32
-
-
84897586040
-
Toward secure multi-keyword top-k retrieval over encrypted cloud data
-
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li Toward secure multi-keyword top-k retrieval over encrypted cloud data IEEE Trans Depend Secur Comput 10 4 2013 239 250
-
(2013)
IEEE Trans Depend Secur Comput
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
|