1. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment;Alam;Cluster Comput,2023
2. Cloud computing and information security;Sehgal,2023
3. Searchable encryption on the cloud: a survey;Andola;J Supercomput,2022
4. Practical techniques for searches on encrypted data;Song,2000
5. IXT: Improved searchable encryption for multi-word queries based on PSI;Yang;Front Comput Sci,2023