Author:
Sharma Deepak,Singh Avtar
Reference21 articles.
1. Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval. IEEE Trans Cloud Comput 5(3):499–509
2. Chatterjee A, Sengupta I (2015) Searching and sorting of fully homomorphic encrypted data on cloud. In: IACR cryptology ePrint archive. IACR, p 981
3. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. S&P. IEEE, pp 44–55
4. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
5. Liu Q, Wang G, Wu J (2009) An efficient privacy preserving keyword search scheme in cloud computing. In: International conference on IEEE computational science and engineering, 2009. CSE’09. IEEE, pp 715–720