Author:
Duan Shengchen,Liu Hong,Gu Lize
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference52 articles.
1. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proc IEEE Symp Sec Priv IEEE 44–55
2. Goh EJ et al (2003) Secure incidences. In IACR Cryptol, ePrint Arch 216
3. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19:895–934
4. Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. Proc ACM Conf Comput Commun Sec 965–976
5. Islam MS, Kuzu M, Kantarcioglu M (2012) Access pattern disclosure on searchable encryption: ramification, attack and mitigation. Ndss 20:12
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献