Author:
Laxmi K. Bhagya,Praveena B. J.,Priyanka M.
Reference15 articles.
1. Y. Earn, R. Alsaqour, M. Abdelhaq and T. Abdullah, “Searchable symmetric encryption: review and evaluation”, Journal of Theoretical and Applied Information Technology, vol. 30, (2011).
2. R. Koletka and A. Hutchison, “An architecture for secure, searchable cloud storage”, IEEE, Information Security South Africa (ISSA), pp. 15–17, (2011).
3. E. Stefanov, C. Papamanthou and E. Shi, “Practical Dynamic Searchable Encryption with Small Leakage”, IACR Cryptology ePrint Archive, (2013).
4. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing”, INFOCOM, 2010 Proceedings IEEE, Dept. of ECE, Illinois Inst. of Technol., Chicago, IL, USA, (2010).
5. J. Bringer, H. Chabanne and B. Kindarji, “Error-tolerant searchable encryption Communication and Information Systems Security Symposium”, International Conference on Communications (ICC), Dresden, Germany, pp. 14–18, (2009).