Publisher
Springer International Publishing
Reference20 articles.
1. Lecture Notes in Computer Science;M Abadi,2000
2. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)
3. Lecture Notes in Computer Science;C Bösch,2011
4. Bost, R.: $$\sum $$o$$\varphi $$o$$\varsigma $$: forward secure searchable encryption. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2016)
5. Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献