Author:
Kwon Hyunsoo,Hahn Changhee,Kim Daeyoung,Hur Junbeom
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference23 articles.
1. Abadi M, Boneh D, Mironov I, Raghunathan A, Segev G (2013) Message-locked encryption for lock-dependent messages. Adv Cryptol - CRYPTO 8042:374–391. doi: 10.1007/978-3-642-40041-4_21
2. Bellare M, Keelveedhi S (2013) DupLESS: Server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX conference on security, pp 179-194
3. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attributed-based encryption. IEEE Symp Secur Pri:321–334. doi: 10.1109/SP.2007.11
4. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. Adv Crypto- EUROCRYPT 7881:296–312. doi: 10.1007/978-3-642-38348-9_18
5. Bellare M, Namprempre C, Pontcheval D, Semanko M (2003) The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. J Cryptol 16(3):185–215. doi: 10.1007/s00145-002-0120-1
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献