Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 346-351.doi: 10.11896/j.issn.1002-137X.2016.11A.080
Previous Articles Next Articles
CHEN Chao-qun and LI Zhi-hua
[1] 程芳权,彭志勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012,35(11):2215-2227 [2] Boneh D,Di Crescenzo G,Ostrovsky R.et al.Public Key Encryption with Keyword Search[J].Eurocrypt,2004,9(16):506-522 [3] Rhee H S,Park J H,Susilo W,et al.Trapdoor Security in aSearchable Public-key Encryption Scheme with a designated Tester[J].Journal of and Systems Software,2010,3(5):763-771 [4] Goh E J.Secure Indexes[EB/OL].[2012-12-13].http://epr-int.iacr.org [5] Song D X,Wanger D,Perrig A.Pratical Techniques for Searches on Encrypted Data[J].IEEE Symposium on Security & Privacy,2012:44-55 [6] Wang C,Cao N,Li J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]∥Proceedings of ICDCS.Genova,Italy,2010:253-262 [7] 李倩,岳风顺,王国军.安全云存储中高效的多关键词查找方案[J].计算机科学,2012,39(12):158-161 [8] Lu Wen-jun,Swaminathan A,Avinash L,et al.Enabling Search over Encrypted Multimedia Databases[C]∥Proceedings of SPIE-The International Society for Optical Engineering.2009 [9] Wang C,Cao N,Ren K,et al.Enabling secure and efficientranked keyword search over outsourced cloud data[J].IEEE Transaction on Parallel and Distributed Systems,2012,23(8):1467-1479 [10] Cao Ning,Wang Cong,Li Ming,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2011,25(1):829-837 [11] Chen Chi,Zhu Xiao-jie,Shen Pei-song,et al.an efficient privacy-preserving ranked keyword search method[J].IEEE Transactions on Parallel and Distributed Systems,2015:1-1 [12] Yang Yan-jiang,Lu Hai-bing,Weng Jian.Muti-user private keyword search for cloud computing[C]∥Proceedings of Third IEEE International Conference on Cloud Computing Technology and Science(CloudCom).Athens,Greece,2011:264-271 [13] 李浪,李仁发,李静,等.一种SMS4加密算法差分功耗攻击[J].计算机科学,2010,37(7):39-41 |
No related articles found! |
|