Computer Science ›› 2015, Vol. 42 ›› Issue (3): 136-139.doi: 10.11896/j.issn.1002-137X.2015.03.028
Previous Articles Next Articles
FANG Zhong-jin, ZHOU Shu and XIA Zhi-hua
[1] Song D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy.2000:44-55 [2] Goh E J.Secure Indexes.Cryptology ePrint Archive,Report2003/216.http://eprint.iacr.org/,2003 [3] Chow R,Golle P,Jakobsson M,et al.Controlling Data in theCloud:Outsourcing Computation without Outsourcing Control[C]∥Proceedings of ACM Workshop on Cloud Computing Security (CCSW’09).New York,2009:85-90 [4] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]∥Proceedings of International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt’04).Interlaken,Switzerland,Vol.3027,2004:506-522 [5] 李春艳,张学杰.基于基准测试的高性能计算云研究[J].计算机科学,2013,40(12):23-30 [6] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥Proc.of IEEE INFOCOM,Mini-Conference.2010:441-445 [7] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]∥Proceedings of International Conference on Pairing-Based Cryptography (Pairing’07).2007:2-22 [8] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security (ICICS’05).Vol.3783,2005:414-426 [9] Boneh D,Waters B.Conjunctive,Subset,and Range Queries on Encrypted Data[C]∥Proceedings of TCC’07.2007:535-554 [10] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784 [11] Li J,Wang Q,Wang C,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]∥IEEE INFOCOM 2010 Mini-Conference.San Diego,CA,March 2010 [12] Cao N,Wang C,Li M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]∥Proceedings of IEEE INFOCOM 2011.2011:829-837 [13] Hore B,Mehrotra S,Canim M,et al.Secure multidimensionalrange queries over outsourced data[J].The VLDB Journal, 2012(21):333-358 [14] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83 [15] Wang Peng,Ravishankar C V.Secure and Efficient Range Queries on Outsourced Databases Using R-trees[C]∥ICDE Conference.2013:314-325 [16] Curtmola R,Garay J A,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions [C]∥Proc.of ACM CCS.2006:79-88 [17] Golle P,Staddon J,Waters B.Secure Conjunctive Keyword Search over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security Conference (ACNS’04).2004:31-45 |
No related articles found! |
|