Author:
Su Jianan,Bartholic Michael,Stange Andrew,Ushida Ryosuke,Matsuo Shin’ichiro
Publisher
Springer International Publishing
Reference21 articles.
1. Information technology - security techniques - cybersecurity and ISO and IEC standards. Report ISO/IEC TR 27103:2018, ISO/IEC JTC1 (2018)
2. Baer, W.: Rewarding it security in the marketplace. Contemp. Secur. Policy 24(1), 190–208 (2003)
3. Bellare, M., Yilek, S.: Encryption schemes secure under selective opening attack. Cryptology ePrint Archive, Report 2009/101.
https://eprint.iacr.org/2009/101
(2009)
4. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004).
https://doi.org/10.1007/978-3-540-24676-3_30
5. Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.E.: Public key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50–67. Springer, Heidelberg (2007).
https://doi.org/10.1007/978-3-540-74143-5_4
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献