Author:
Rhee Hyun Sook,Park Jong Hwan,Susilo Willy,Lee Dong Hoon
Funder
Defense Acquisition Program Administration
Agency for Defense Development
Subject
Hardware and Architecture,Information Systems,Software
Reference20 articles.
1. Abdalla, M., Bellare, M., Rogaway, P., 2001. DHIES: an encryption scheme based on the Diffie–Hellman problem. In: Proceedings of CT-RSA’01. LNCS, vol. 2020, pp. 143–158.
2. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H., 2005. Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Proceedings of Crypto’05. LNCS, vol. 3621, pp. 205–222.
3. Baek, J., Safavi-Naini, R., Susilo, W., 2006. Public key encryption with keyword search revisited. In: Proceedings of ACIS’06.
4. Boneh, D., Boyen, X., 2004. Efficient selective-ID secure identity based encryption without random oracle. In: Proceedings of EURO 2004. LNCS, vol. 3027.
5. Boneh, D., Waters, B., 2007. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of TCC’07. LNCS, vol. 4392, pp. 535–554.
Cited by
229 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献