Author:
Li Jianwei,Wang Xiaoming,Gan Qingqing
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference33 articles.
1. Osanaiye O, Choo K K R, Dlodlo M. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 2016, 67: 147–165
2. Shen J, Zhou T, Chen X, Li J, Susilo W. Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security, 2018, 13(4): 912–925
3. Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy. 2000, 44–55
4. Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proceedings of 2012 ACM conference on Computer and communications security. 2012: 965–976
5. Kun H, Chen J, Zhou Q, Du R and Xiang Y. Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Transactions on Information Forensics and Security, 2020, 16:1538–1549