1. Song DX, Wagner D, Perrig A (2000) : Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy, IEEE, 44–55
2. Goh E-J et al (2003) : Secure incidences. In: IACR Cryptol, ePrint Arch., 216
3. Searchable symmetric encryption: Improved definitions and efficient constructions;Curtmola R;J Comput Secur,2006
4. Kamara S, Papamanthou C, Roeder T (2012) : Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security. pp. 965–976
5. Islam MS, Kuzu M, Kantarcioglu M (2012) In: Ndss (ed) Access pattern disclosure on searchable encryption: ramification, attack and mitigation, vol 20. Citeseer, p 12