1. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. Crypto 3621:205–222 (Springer)
2. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. Asiacrypt 2894:452–473 (Springer)
3. Anagnostopoulos I, Zeadally S, Exposito E (2016) Handling big data: research challenges and future directions. J Supercomput 72(4):1494–1516
4. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
5. Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Comput Sci Appl ICCSA 2008:1249–1259