Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference29 articles.
1. Bao F, Deng R, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Proceedings of ISPEC’08
2. Behm A, Ji S, Li C, Lu J (2009) Space-constrained gram-based indexing for efficient approximate string search. In: Proceedings of ICDE’09
3. Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Proceedings of crypto 2007, volume 4622 of LNCS. Springer, Berlin
4. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of TCC’07, pp 535–554
5. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of EUROCRYP’04
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献