Author:
Ali Azza A.,Saleh Shereen
Publisher
Springer International Publishing
Reference34 articles.
1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data, In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44–55 (2000)
2. Goh, E.-J.: Secure indexes. In: Cryptology ePrint Archive on October 7th, pp. 1–18 (2003)
3. Boneh, D., DiCrescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of Euro Crypto’04, pp. 506–522 (2004)
4. Li, J., Wang, Q., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)
5. Jin Shi, X., Ping Hu, Sh.: Fuzzy multi-keyword query on encrypted data in the cloud. In: 2016 4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/Intelligence and Applied Informatics/1st International Conference on Big Data, Cloud Computing, Data Science & Engineering (ACIT-CSII-BCD), pp. 419–425 (2016)