Author:
Jiang Qin,Qi Yong,Qi Saiyu,Zhao Wenjia,Lu Youshui
Funder
National Natural Science Foundation of China
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference43 articles.
1. M.A. Abdelraheem, T. Andersson, and C. Gehrmann. Inference and record-injection attacks on searchable encrypted relational databases. Arxiv:24, 2017.
2. Executing boolean queries on an encrypted bitmap index;Abdelraheem,2016
3. SPEICHER: Securing LSM-based Key-value stores using Shielded Executing;Bailleu,2019
4. Shielding applications from an untrusted cloud with haven;Baumann,2014
5. Forward secure searchable encryption;Bost,2016
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献