Author:
Ananthi S.,Sendil M. Sadish,Karthik S.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of S&P (2000)
2. Goh, E.J.: Secure indexes. Cryptology ePrint Archive (2003),
http://eprint.iacr.org/2003/216
3. Lecture Notes in Computer Science;Y.-C. Chang,2005
4. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proc. of ACM CCS (2006)
5. Lecture Notes in Computer Science;D. Boneh,2004
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design optimization of Solar Power Inverter using the GRA Method;REST Journal on Advances in Mechanical Engineering;2024-02-20
2. Evaluating Drinking Water Quality in Salem District Using the DEMATEL Method;REST Journal on Emerging trends in Modelling and Manufacturing;2024-02-19
3. Privacy Preserving on Searchable Encrypted Data in Cloud;Lecture Notes in Electrical Engineering;2020-08-14
4. Detecting Local Machine Data Leakage in Real Time;Advances in Digital Forensics XVI;2020
5. Secure and Privacy Preserving Keyword Search over the Large Scale Cloud Data;Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security;2016