1. Lecture Notes in Computer Science;D. Boneh,2004
2. Lecture Notes in Computer Science;M. Abdalla,2005
3. Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: Network and Distributed System Security Symposium NDSS (2004)
4. Baek, J., Safiavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. Available on Cryptology ePrint Archive, Report 2005/119.
5. Lecture Notes in Computer Science;D. Boneh,2001