Computer Science ›› 2016, Vol. 43 ›› Issue (2): 159-162.doi: 10.11896/j.issn.1002-137X.2016.02.035
Previous Articles Next Articles
DUAN Yang-yang and LI Shi-yang
[1] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proceedings IEEE Symposium on Securi-ty and Privacy.2000:44-55 [2] Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[M]∥Advances in Cryptology-Eurocrypt.Springer Berlin Heidelberg,2004:506-522 [3] Chen F,Liu A X.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACM Transactions on Networking,2012,20(6):1774-1787 [4] Shi E,Bethencourt J,Chan T H H,et al.Multi-dimensionalrange query over encrypted data[C]∥IEEE Symposium on Security and Privacy(P’07).IEEE,2007:350-364 [5] Li Shuang,Xu Mao-zhi.Attribute-based public encryption with keyword search[J].Chinese Journal of Computers,2014,7(5):1017-1024(in Chinese) 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,7(5):1017-1024 [6] Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[M]∥Theory of Cryptography.Springer Berlin Heidelberg,2007:535-554 [7] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over en-crypted data in cloud computing[C]∥INFOCOM.IEEE,2010:1-5 [8] Yang Y,Lu H,Weng J.Multi-user private keyword search for cloud computing[C]∥IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom).IEEE,2011:264-271 [9] Bao F,Deng R H,Ding X,et al.Private query on encrypted data in multi-user settings[M]∥Information Security Practice and Experience.Springer Berlin Heidelberg,2008:71-85 [10] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:79-88 [11] Shen Zhi-rong,Xue Wei,Shu Ji-wu.Survey on the research and development of searchable encryption schemes[J].Journal of Software,2014,5(4):880-895(in Chinese) 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,5(4):880-895 [12] Gu C,Zhu Y.New Efficient Searchable Encryption Schemesfrom Bilinear Pairings[J].International Journal of Network Security,2010,10(1):25-31 [13] Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[C]∥IEEE 30th International Conference on Distributed Computing Systems(ICDCS).2010:253-262 [14] Fang Zhong-jin,Zhou Shu,Xia Zhi-hua.Research on fuzzysearch over encrypted cloud data based on keywords[J].Computer Science,2015,2(3):136-139(in Chinese) 方忠进,周舒,夏志华.基于关键字的加密云数据模糊搜索策略研究[J].计算机科学,2015,2(3):136-139 [15] Zheng Q,Xu S,Ateniese G.VABKS:Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data[J].IACR Cryptology ePrint Archive,2013:462 [16] Zheng Yu,Gao Bao.Method based on homomorphic hash for data changes capture of LDAP directory[J].Application Research of Computers,2013,0(7):2007-2009(in Chinese) 郑煜,高宝.基于同态哈希的目录服务数据变化捕获方法[J].计算机应用研究,2013,30(7):2007-2009 |
No related articles found! |
|