Author:
Yin Hui,Qin Zheng,Zhang Jixin,Ou Lu,Li Fangmin,Li Keqin
Funder
National Natural Science Foundation of China
Natural Science Foundation of Hunan Province, China
Science and Technology Key Projects of Hunan Province, China
Outstanding Youth Research Project of Provincial Education Department of Hunan, China
Open Research Fund of Hunan Provincial Key Laboratory of Network Investigational Technology, China
Science and Technology Planning Project of Changsha, China
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference39 articles.
1. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance;Mather,2009
2. Cryptographic cloud storage;Kamara,2010
3. Security challenges for the public cloud;Ren;IEEE Internet Comput.,2012
4. D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: IEEE Symposium on Security and Privacy, Vol. 8, 2000, pp. 44–55.
5. Secure Indexes;Goh,2003
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献