1. Song, D.X., Wagner, D., and Perrig, A. (2000, January 14–17). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, S & P 2000, Berkeley, CA, USA.
2. Kamara, S., Papamanthou, C., and Roeder, T. (2012, January 16–18). Dynamic searchable symmetric encryption. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA.
3. Curtmola, R., Garay, J., Kamara, S., and Ostrovsky, R. (November, January 30). Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, Alexandria, VA, USA.
4. A Discretionary Searchable Encryption Scheme in Multi-User Settings;J. Comput. Res. Dev.,2015
5. A multi-user searchable encryption scheme with keyword authorization in a cloud storage;Future Gener. Comput. Syst.,2017