Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference36 articles.
1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574, 2004
2. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 5479 LNCS, pp. 224–241, 2009
3. Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6841 LNCS, pp. 578–595, 2011
4. Bost, R.: $$\Sigma $$o$$\phi $$o$$\zeta $$—Forward secure searchable encryption. In Proceedings of the ACM Conference on Computer and Communications Security, volume 24–28-October-2016, pp. 1143–1154, 2016
5. Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. NDSS 14, 23–26 (2014)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献