-
1
-
-
0033705124
-
Practical techniques for searches in encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches in Encrypted Data, " IEEE Symp. on Research in Security and Privacy, pp. 44-55, 2000.
-
(2000)
IEEE Symp. on Research in Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
3
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions, " In Proceedings of the 13th ACM conference on Computer and Communications Security, pp. 79-88, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
4
-
-
35048901123
-
Publickey encryption with keyword search
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Publickey Encryption with Keyword Search, " Proc. of Eurocrypt, pp. 506-522, 2004.
-
(2004)
Proc. of Eurocrypt
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
34548774576
-
Multidimensional range query over encrypted data
-
USA
-
E. Shi, J. Bethencourt, T. H. Chan, D. Song, A. Perrig, "Multidimensional range query over encrypted data, " In IEEE Symposium on Security and Privacy, " 2007 (SP'07), pp. 350-364, USA, 2007.
-
(2007)
IEEE Symposium on Security and Privacy 2007 (SP'07)
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.H.3
Song, D.4
Perrig, A.5
-
6
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " Parallel and Distributed Systems, IEEE Transactions on, 25 (1): 222-233, 2014.
-
(2014)
Parallel and Distributed Systems, IEEE Transactions on
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data, " INFOCOM, 2012 Proceedings IEEE. IEEE, pp. 451-459, 2012.
-
(2012)
INFOCOM, 2012 Proceedings IEEE. IEEE
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
8
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
Springer Berlin Heidelberg
-
S. Kamara, C. Papamanthou, "Parallel and dynamic searchable symmetric encryption, " In Financial Cryptography and Data Security, FC, pp. 258-274, Springer Berlin Heidelberg, 2013.
-
(2013)
Financial Cryptography and Data Security, FC
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
9
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries, " In Advances in Cryptology-CRYPTO, pp. 353-373, 2013.
-
(2013)
Advances in Cryptology-CRYPTO
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.5
Steiner, M.6
-
10
-
-
70349216521
-
Secure image retrieval through feature protection
-
W. Lu, A. L. Varna, A. Swaminathan, and M. Wu, "Secure Image Retrieval through Feature Protection, " Proc. of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533-1536, 2009.
-
(2009)
Proc. of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.L.2
Swaminathan, A.3
Wu, M.4
-
11
-
-
71449083267
-
Enabling search over encrypted multimedia databases
-
W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, "Enabling Search over Encrypted Multimedia Databases, " IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, pp. 725418-725418, 2009.
-
(2009)
IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics
, pp. 725418
-
-
Lu, W.1
Swaminathan, A.2
Varna, A.L.3
Wu, M.4
-
12
-
-
84908601709
-
Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization
-
W. Lu, A. Varna, and M. Wu. "Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization, " Access, IEEE, 2: 125-141, 2014.
-
(2014)
Access, IEEE
, vol.2
, pp. 125-141
-
-
Lu, W.1
Varna, A.2
Wu, M.3
-
15
-
-
70449591698
-
Transparent and perceptually enhanced jpeg image encryption
-
B. Yang, C. Zhou, C. Busch, and X. Niu, "Transparent and Perceptually Enhanced JPEG Image Encryption, " In Digital Signal Processing, 2009 16th International Conference on, IEEE, pp. 1-6, 2009.
-
(2009)
Digital Signal Processing, 2009 16th International Conference On, IEEE
, pp. 1-6
-
-
Yang, B.1
Zhou, C.2
Busch, C.3
Niu, X.4
-
16
-
-
70449563105
-
A robust chaos-based image encryption scheme
-
W. Li, and N. Yu, "A robust chaos-based image encryption scheme, " Multimedia and Expo, 2009. ICME 2009, IEEE International Conference on. IEEE, pp. 1034-1037, 2009.
-
(2009)
Multimedia and Expo, 2009. ICME 2009 IEEE International Conference On. IEEE
, pp. 1034-1037
-
-
Li, W.1
Yu, N.2
-
17
-
-
84904739914
-
Reversible data hiding in encrypted jpeg bitstream
-
Z. Qian, X. Zhang, and S. Wang, "Reversible Data Hiding in Encrypted JPEG Bitstream, " IEEE Transactions on Multimedia. 16 (5): 1486-1491. 2014.
-
(2014)
IEEE Transactions on Multimedia.
, vol.16
, Issue.5
, pp. 1486-1491
-
-
Qian, Z.1
Zhang, X.2
Wang, S.3
-
19
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Springer Berlin Heidelberg
-
Y. Q. Shi, C. Chen, and W. Chen, ''A Markov process based approach to effective attacking JPEG steganography, '' In Information Hiding, Springer Berlin Heidelberg, pp. 249-264, 2007.
-
(2007)
Information Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
21
-
-
84961580313
-
-
http://wang. ist. psu. edu/docs/related/
-
-
-
|