-
1
-
-
84862907810
-
Security challenges for the public cloud
-
Jan-Feb.
-
K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud, " IEEE Internet Comput., vol. 16, no. 1, pp. 69-73, Jan-Feb. 2012.
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
3
-
-
77649261628
-
-
Ph. D. dissertation, Stanford Univ., Stanford, CA, USA
-
C. Gentry, "A fully homomorphic encryption scheme, " Ph. D. dissertation, Stanford Univ., Stanford, CA, USA, 2009.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
4
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams, " J. ACM, vol. 43, no. 3, pp. 431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Proc. Adv. Cryptol.-Eurocrypt, 2004, pp. 506-522.
-
(2004)
Proc. Adv. Cryptol.-Eurocrypt
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
38049138213
-
Public key encryption that allows pir queries
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III, "Public key encryption that allows pir queries, " in Proc. Adv. Cryptol., 2007, pp. 50-67.
-
(2007)
Proc. Adv. Cryptol.
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.E.4
-
7
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE Symp. Secur. Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Secur. Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions, " in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur.
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing, " in IEEE Proc. INFOCOM, 2010, pp. 1-5.
-
(2010)
IEEE Proc. INFOCOM
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
12
-
-
84864234736
-
Efficient similarity search over encrypted data
-
M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data, " in Proc. IEEE 28th Int. Conf. Data Eng., 2012, pp. 1156-1167.
-
(2012)
Proc. IEEE 28th Int. Conf. Data Eng.
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
13
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data, " in Proc. IEEE INFOCOM, 2012, pp. 451-459.
-
(2012)
Proc. IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
14
-
-
84904421834
-
Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
-
B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud, " in Proc. IEEE INFOCOM, 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
15
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data, " in Proc. Appl. Cryptography Netw. Secur., 2004, pp. 31-45.
-
(2004)
Proc. Appl. Cryptography Netw. Secur.
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
16
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system, " in Proc. 1st Int. Conf. Pairing-Based Cryptography, 2007, pp. 2-22.
-
(2007)
Proc. 1st Int. Conf. Pairing-Based Cryptography
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
17
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data, " in Proc. 7th Int. Conf. Inf. Commun. Secur., 2005, pp. 414-426.
-
(2005)
Proc. 7th Int. Conf. Inf. Commun. Secur.
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
18
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Proc. 4th Conf. Theory Cryptography, 2007, pp. 535-554.
-
(2007)
Proc. 4th Conf. Theory Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
19
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
B. Zhang and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search, " J. Netw. Comput. Appl., vol. 34, no. 1, pp. 262-267, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
-
20
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products, " in Proc. Adv. Cryptol., 2008, pp. 146-162.
-
(2008)
Proc. Adv. Cryptol.
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems, " in Proc. 6th Theory oCryptography Conf. Theory Cryptography., 2009, pp. 457-473.
-
(2009)
Proc. 6th Theory OCryptography Conf. Theory Cryptography.
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
22
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Tech., 2010, pp. 62-91.
-
(2010)
Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Tech.
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
23
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L. Varna, S. He, M. Wu, and D. W. Oard, "Confidentiality-preserving rank-ordered search, " in Proc. ACM Workshop Storage Security Survivability, 2007, pp. 7-12.
-
(2007)
Proc. ACM Workshop Storage Security Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
24
-
-
70349110963
-
Zerber+ r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+ r: Top-k retrieval from a confidential index, " in Proc. 12th Int. Conf. Extending Database Technol. : Adv. Database Technol., 2009, pp. 439-449.
-
(2009)
Proc. 12th Int. Conf. Extending Database Technol. : Adv. Database Technol.
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
25
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
26
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " in Proc. IEEE INFOCOM, Apr. 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM, Apr.
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
27
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, " in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. secur., 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur.
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
28
-
-
84897712725
-
A practical and secure multi-keyword search method over encrypted cloud data
-
C. Orencik, M. Kantarcioglu, and E. Savas, "A practical and secure multi-keyword search method over encrypted cloud data, " in Proc. IEEE 6th Int. Conf. Cloud Comput., 2013, pp. 390-397.
-
(2013)
Proc. IEEE 6th Int. Conf. Cloud Comput.
, pp. 390-397
-
-
Orencik, C.1
Kantarcioglu, M.2
Savas, E.3
-
29
-
-
84912129071
-
Secure ranked multi-keyword search for multiple data owners in cloud computing
-
W. Zhang, S. Xiao, Y. Lin, T. Zhou, and S. Zhou, "Secure ranked multi-keyword search for multiple data owners in cloud computing, " in Dependable Syst. Networks (DSN), IEEE 44th Annu. IEEE/IFIP Int. Conf., 2014, pp. 276-286.
-
(2014)
Dependable Syst. Networks (DSN), IEEE 44th Annu. IEEE/IFIP Int. Conf.
, pp. 276-286
-
-
Zhang, W.1
Xiao, S.2
Lin, Y.3
Zhou, T.4
Zhou, S.5
-
30
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption, " in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 965-976.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
32
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. RoŞu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for boolean queries, " in Proc. Adv. Cryptol, 2013, pp. 353-373.
-
(2013)
Proc. Adv. Cryptol
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
RoŞu, M.-C.5
Steiner, M.6
-
33
-
-
85178119595
-
Dynamic searchable encryption in very large databases: Data structures and implementation
-
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Dynamic searchable encryption in very large databases: Data structures and implementation, " in Proc. Netw. Distrib. Syst. Security Symp., vol. 14, 2014, pp. 1-16.
-
(2014)
Proc. Netw. Distrib. Syst. Security Symp.
, vol.14
, pp. 1-16
-
-
Cash, D.1
Jaeger, J.2
Jarecki, S.3
Jutla, C.4
Krawczyk, H.5
Rosu, M.-C.6
Steiner, M.7
-
35
-
-
84880921984
-
Feasibility and finite convergence analysis for accurate on-line-support vector learning
-
Aug.
-
B. Gu and V. S. Sheng, "Feasibility and finite convergence analysis for accurate on-line-support vector learning, " IEEE Trans. Neural Netw. Learn. Syst., vol. 24, no. 8, pp. 1304-1315, Aug. 2013.
-
(2013)
IEEE Trans. Neural Netw. Learn. Syst.
, vol.24
, Issue.8
, pp. 1304-1315
-
-
Gu, B.1
Sheng, V.S.2
-
36
-
-
84924428800
-
Efficient feature selection and classification for vehicle detection
-
X. Wen, L. Shao, W. Fang, and Y. Xue, "Efficient feature selection and classification for vehicle detection, " IEEE Trans. Circuits Syst. Video Technol, DOI: 10. 1109/TCSVT. 2014. 2358031.
-
IEEE Trans. Circuits Syst. Video Technol
-
-
Wen, X.1
Shao, L.2
Fang, W.3
Xue, Y.4
-
38
-
-
70849131456
-
Secure KNN computation on encrypted databases
-
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, "Secure KNN computation on encrypted databases, " in Proc. ACM SIGMOD Int. Conf. Manag. Data, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manag. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
39
-
-
84962441538
-
-
(2014). Request for comments. [Online]. Available: http://www. rfc-editor. org/index. html
-
(2014)
Request for Comments
-
-
|