Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004). Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, 506–522
2. Byun J W, Rhee H S, Park H A (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, 75–83
3. Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163
4. Emmanuel A, Jin CH, Li FG (2018) Certificateless deniably authenticated encryption and its application to e-voting system. Telecommun Syst 70(3):417–434
5. Emura K, Miyaji A, Rahman MS, Omote K (2015) Generic constructions of secure-channel free searchable encryption with adaptive security. Secur Commun Netw 8(8):1547–1560
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献