Author:
Li Ruixuan,Xu Zhiyong,Kang Wanshang,Yow Kin Choong,Xu Cheng-Zhong
Funder
National Natural Science Foundation
Innovation Fund of Huazhong University of Science and Technology
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference34 articles.
1. Addressing cloud computing security issues;Zissis;Future Gener. Comput. Syst.,2012
2. Identity-based data storage in cloud computing;Future Gener. Comput. Syst.,2013
3. Privacy preserving keyword searches on remote encrypted data;Chang,2005
4. C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: The 30th International Conference on Distributed Computing Systems, ICDCS’10, 2010, pp. 253–262.
5. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in: IEEE Conference on Computer Communications, INFOCOM’10, 2010, pp. 1–5.
Cited by
80 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献