Publisher
Springer Nature Switzerland
Reference14 articles.
1. Lecture Notes in Computer Science;D Boneh,2004
2. Waters B. R., Balfanz, D, Glenn Durfee, G., K. Smetters, D.K.: Building an encrypted and searchable audit log. In: Conference: Proceedings of the Network and Distributed System Security Symposium. NDSS, San Diego, California, USA (2004). https://www.cs.utexas.edu/~bwaters/publications/papers/audit_log.pdf
3. Ding, M., Gao, F., Jin, Z., Zhang, H.: An efficient public key encryption with conjunctive keyword search scheme based on pairings. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (2012). https://doi.org/10.1109/icnidc.2012.6418809
4. Kerschbaum, F.: Secure conjunctive keyword searches for unstructured text. In: 2011 5th International Conference on Network and System Security (2011). https://doi.org/10.1109/icnss.2011.6060016
5. Hu, C., Liu, P.: Public key encryption with ranked multi-keyword search. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (2013). https://doi.org/10.1109/incos.2013.24