Author:
Yang Guomin,Tan Chik How,Huang Qiong,Wong Duncan S.
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptology 21(3), 350–391 (2008)
2. Lecture Notes in Computer Science;M. Abe,2005
3. Lecture Notes in Computer Science;M. Bellare,2007
4. Lecture Notes in Computer Science;M. Bellare,1998
5. Lecture Notes in Computer Science;M. Bellare,2008
Cited by
228 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献