Author:
Li Jingwei,Li Jin,Chen Xiaofeng,Liu Zheli,Jia Chunfu
Funder
National Key Basic Research Program of China
National Natural Science Foundation of China
Specialized Research Fund for the Doctoral Program of Higher Education of China
Grant for Universities in Guangzhou City
Foundation for Distinguished Young Talents in Higher Education of Guangdong Province
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference25 articles.
1. A view of cloud computing;Armbrust;Communications of the ACM,2010
2. D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: IEEE Symposium on Security and Privacy, 2000, pp. 44–55.
3. Shared and searchable encrypted data for untrusted servers;Dong;Journal of Computer Security,2011
4. M. Li, S. Yu, N. Cao, W. Lou, Authorized private keyword search over encrypted data in cloud computing, in: 2011 31st International Conference, Distributed Computing Systems, ICDCS, 2011, pp. 383–392.
5. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in: 2010 Proceedings IEEE, INFOCOM, 2010, pp. 1–5.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献