Publisher
Springer Science and Business Media LLC
Reference55 articles.
1. Alornyo, S., Mensah, A.E., Abbam, A.O.: Identity-based public key cryptographic primitive with delegated equality test against insider attack in cloud computing. Int. J. Netw. Secur. 22(5), 743–751 (2020)
2. Wu, T., Ma, S., Mu, Y., and Zeng, S.: ID-based encryption with equality test against insider attack. In: Australasian Conference on Information Security and Privacy (pp. 168–183). Springer, Cham (2017)
3. Lee, H.T., Wang, H., Zhang, K.: Security analysis and modification of ID-based encryption with equality test from ACISP 2017. In: Australasian Conference on Information Security and Privacy (pp. 780–786). Springer, Cham (2018)
4. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search scheme over encrypted data. In Workshop on Secure Data Management (pp. 75–83). Springer, Berlin, Heidelberg (2006)
5. Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: International Conference on Autonomic and Trusted Computing (pp. 100–105). Springer, Berlin, Heidelberg (2008)