-
1
-
-
80054816611
-
Security analysis of authentication protocols for next-generation mobile and CE cloud services
-
2011, Berlin, Germany
-
S. Grzonkowski, P. M. Corcoran, and T. Coughlin, "Security analysis of authentication protocols for next-generation mobile and CE cloud services," in Proc. IEEE Int. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83-87.
-
(2011)
Proc. IEEE Int. Conf. Consumer Electron.
, pp. 83-87
-
-
Grzonkowski, S.1
Corcoran, P.M.2
Coughlin, T.3
-
2
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA
-
D. X. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Security Priv., BERKELEY, CA, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Priv.
, pp. 44-55
-
-
Song, D.X.D.1
Wagner, D.2
Perrig, A.3
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
Switzerland
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. EUROCRYPT, Interlaken, SWITZERLAND, 2004, pp. 506-522.
-
(2004)
Proc. EUROCRYPT, Interlaken
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
New York, NY
-
Y. C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. 3rd Int. Conf. Applied Cryptography Netw. Security, New York, NY, 2005, pp. 442-455.
-
(2005)
Proc. 3rd Int. Conf. Applied Cryptography Netw. Security
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexandria, Virginia
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, Alexandria, Virginia, 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
6
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Santa Barbara, CA
-
M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in Proc. 27th Annu. Int. Cryptol. Conf. Adv. Cryptol., Santa Barbara, CA, 2007, pp. 535-552.
-
(2007)
Proc. 27th Annu. Int. Cryptol. Conf. Adv. Cryptol.
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
7
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Amsterdam, NETHERLANDS
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Conf. Theory Cryptography, Amsterdam, NETHERLANDS, 2007, pp. 535-554.
-
(2007)
Proc. 4th Conf. Theory Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
9
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. J. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.J.4
-
10
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
Alexandria, VA
-
A. Swaminathan, Y. Mao, G. M. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard, "Confidentiality-preserving rank-ordered search," in Proc. ACM ACM Workshop Storage Security Survivability, Alexandria, VA, 2007, pp. 7-12.
-
(2007)
Proc. ACM ACM Workshop Storage Security Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.M.3
Gou, H.4
Varna, A.5
He, S.6
Wu, M.7
Oard, D.8
-
11
-
-
70349110963
-
Zerber+R: Topk retrieval from a confidential index
-
Saint Petersburg, Russia
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+R: Topk retrieval from a confidential index," in Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol., Saint Petersburg, Russia, 2009, pp. 439-449.
-
(2009)
Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol.
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
12
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Genova, Italy
-
C. Wang, N. Cao, J. Li, K. Ren, and W. J. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst., Genova, ITALY, 2010, pp. 253-262.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst.
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.J.5
-
13
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Yellow Mt, China
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security, Yellow Mt, China, 2004, pp. 31-45.
-
(2004)
Proc. Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
14
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
Beijing, China
-
L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. 7th Int. Conf. Inform. Commun. Security, Beijing, China, 2005, pp. 414-426.
-
(2005)
Proc. 7th Int. Conf. Inform. Commun. Security
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
16
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Tokyo, Japan
-
Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. 1st Int. Conf. Pairing-Based Cryptography, Tokyo, JAPAN, 2007, pp. 2-22.
-
(2007)
Proc. 1st Int. Conf. Pairing-Based Cryptography
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
17
-
-
76849085704
-
Privacy-preserving similaritybased text retrieval
-
Feb.
-
H. Pang, J. Shen, and R. Krishnan, "Privacy-preserving similaritybased text retrieval," ACM Trans. Internet Technol., vol. 10, no. 1, pp. 39, Feb. 2010.
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.1
, pp. 39
-
-
Pang, H.1
Shen, J.2
Krishnan, R.3
-
18
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM, Shanghai, China
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.J.5
-
19
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
Hangzhou, China
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, Hangzhou, China, 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
20
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, IL
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic authenticated index structures for outsourced databases," in Proc. ACM SIGMOD, Chicago, IL, 2006, pp. 121-132.
-
(2006)
Proc. ACM SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
21
-
-
2442590644
-
Authenticating query results in edge computing
-
Boston, MA
-
H. H. Pang and K. L. Tan, "Authenticating query results in edge computing," in Proc. 20th Int. Conf. Data Eng., Boston, MA, 2004, pp. 560-571.
-
(2004)
Proc. 20th Int. Conf. Data Eng.
, pp. 560-571
-
-
Pang, H.H.1
Tan, K.L.2
-
22
-
-
21044438930
-
A general model for authenticated data structures
-
May
-
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine, "A general model for authenticated data structures," Algorithmica, vol. 39, no. 1, pp. 21-41, May 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
23
-
-
0009554659
-
Protocols for public key cryptosystems
-
Oakland, CA
-
C. M. Ralph, "Protocols for public key cryptosystems," in Proc. IEEE Symp. Security Priv, Oakland, CA, 1980, pp. 122-122.
-
(1980)
Proc. IEEE Symp. Security Priv
, pp. 122
-
-
Ralph, C.M.1
-
24
-
-
84969346266
-
A certified digital signature
-
R. C. Merkle, "A certified digital signature," in Proc. Adv. cryptol., 1990, vol. 435, pp. 218-238.
-
(1990)
Proc. Adv. Cryptol.
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
25
-
-
0033733822
-
Certificate revocation and certificate update
-
Apr.
-
M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 561-570, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
-
26
-
-
76849102606
-
Authenticating the query results of text search engines
-
Aug.
-
H. Pang and K. Mouratidis, "Authenticating the query results of text search engines," in Proc. VLDB Endow., vol. 1, no. 1, pp. 126-137, Aug. 2008.
-
(2008)
Proc. VLDB Endow.
, vol.1
, Issue.1
, pp. 126-137
-
-
Pang, H.1
Mouratidis, K.2
-
27
-
-
84904514711
-
A hierarchical clustering method for big data oriented ciphertext search
-
Toronto, Canada
-
C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, "A hierarchical clustering method For big data oriented ciphertext search," in Proc. IEEE INFOCOM, Workshop on Security and Privacy in Big Data, Toronto, Canada, 2014, pp. 559-564.
-
(2014)
Proc. IEEE INFOCOM, Workshop on Security and Privacy in Big Data
, pp. 559-564
-
-
Chen, C.1
Zhu, X.J.2
Shen, P.S.3
Hu, J.K.4
-
28
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
San Diego, CA
-
S. C. Yu, C. Wang, K. Ren, and W. J. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.C.1
Wang, C.2
Ren, K.3
Lou, W.J.4
-
29
-
-
0003756969
-
-
2nd ed. San Francisco, CA, USA: Morgan Kaufmann
-
I. H. Witten, A. Moffat, and T. C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann, 1999.
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
30
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
J. MacQueen, "Some methods for classification and analysis of multivariate observations," in Proc. Berkeley Symp. Math. Stat. Prob., California, 1967, p. 14.
-
(1967)
Proc. Berkeley Symp. Math. Stat. Prob., California
, pp. 14
-
-
MacQueen, J.1
-
31
-
-
27144536001
-
Extensions to the k-means algorithm for clustering large data sets with categorical values
-
Sep.
-
Z. X. Huang, "Extensions to the k-means algorithm for clustering large data sets with categorical values," Data Min. Knowl. Discov., vol. 2, no. 3, pp. 283-304, Sep. 1998.
-
(1998)
Data Min. Knowl. Discov.
, vol.2
, Issue.3
, pp. 283-304
-
-
Huang, Z.X.1
-
32
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
Providence, RI
-
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Providence, RI, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
33
-
-
84888339077
-
Efficient Multi-keyword ranked query over encrypted data in cloud computing
-
Jan.
-
R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, "Efficient Multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
-
(2014)
Futur. Gener. Comp. Syst.
, vol.30
, pp. 179-190
-
-
Li, R.X.1
Xu, Z.Y.2
Kang, W.S.3
Yow, K.C.4
Xu, C.Z.5
-
34
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
G. Craig, "Fully homomorphic encryption using ideal lattices," in Proc. 41stAnnu.ACMSymp. Theory Comput., 2009, vol. 9, pp. 169-178
-
(2009)
Proc. 41stAnnu.ACMSymp. Theory Comput.
, vol.9
, pp. 169-178
-
-
Craig, G.1
-
35
-
-
35048901123
-
Public key encryption with keyword search[C]
-
Berlin, Heidelberg
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search[C]," in Proc. Adv. Cryptol., Berlin, Heidelberg, 2004, pp. 506-522.
-
(2004)
Proc. Adv. Cryptol.
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
36
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for Boolean que-ries
-
Berlin, Heidelberg
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean que-ries," in Proc. Adv. Cryptol,. Berlin, Heidelberg, 2013, pp. 353-373.
-
(2013)
Proc. Adv. Cryptol
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.5
Steiner, M.6
-
37
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. Conf. Comput. Commun. Secur., 2012, pp. 965-976.
-
(2012)
Proc. Conf. Comput. Commun. Secur.
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
38
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient construc-tions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient construc-tions," in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur.
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
39
-
-
78650834524
-
Structured encryption and controlled disclosure
-
M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in Proc. Adv. Cryptol., 2010, pp. 577-594.
-
(2010)
Proc. Adv. Cryptol.
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
40
-
-
85178119595
-
Dynamic searchable encryption in very large databases: Data structures and implementation
-
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M. C. Rosu, and M. Steiner, "Dynamic searchable encryption in very large databases: Data structures and implementation," in Proc. Netw. Distrib. Syst. Security Symp., vol. 14, 2014, Doi: http://dx.doi.org/ 10.14722/ndss.2014.23264.
-
(2014)
Proc. Netw. Distrib. Syst. Security Symp.
, vol.14
-
-
Cash, D.1
Jaeger, J.2
Jarecki, S.3
Jutla, C.4
Krawczyk, H.5
Rosu, M.C.6
Steiner, M.7
-
41
-
-
84889073373
-
Outsourced symmetric private information retrieval
-
Nov.
-
S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Outsourced symmetric private information retrieval," in Proc. ACMSIGSAC Conf. Comput. Commun. Secur.,Nov. 2013, pp. 875-888.
-
(2013)
Proc. ACMSIGSAC Conf. Comput. Commun. Secur.
, pp. 875-888
-
-
Jarecki, S.1
Jutla, C.2
Krawczyk, H.3
Rosu, M.4
Steiner, M.5
|