Author:
Jiang Peng,Mu Yi,Guo Fuchun,Wen Qiao-Yan
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference25 articles.
1. Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the IEEE Symposium on Security and Privacy, May 2000, pp.44-55.
2. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Lecture Notes in Computer Science 3027, Cachin C, Camenisch J L (eds.), Springer, 2004, pp.506-522.
3. Yau WC, Heng S H, Goi B M. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Lecture Notes in Computer Science 5060, Rong C M, Jaatun M C, Sandnes F E, Yang L T, Ma J H (eds.), Springer, 2008, pp.100-105.
4. Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In Lecture Notes in Computer Science 5072, Gervasi O, Murgante B, Laganà A, Taniar D, Mun Y, Gavrilova M L (eds.), Springer, 2008, pp.1249-1259.
5. Rhee H S, Park J H, Susilo W, Lee D H. Improved searchable public key encryption with designated tester. In Proc the 4th International Symposium on Information, Computer and Communications Security, March 2009, pp.376-379.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献