共 16 条
[1]
Popa R.A., Redfield C.M.S., Zeldovich N., Et al., CryptDB: Protecting confidentiality with encrypted query processing, Proc of the 23rd ACM Symp on Operating Systems Principles(SOSP), pp. 85-100, (2011)
[2]
Chen P., Zhang T., Zhao M., Et al., Database as service system for business database application hosting and its privacy preservation mechanism, Computer Science, 40, 11, (2013)
[3]
Wang H., Yang G., Liu G., Et al., Design and implementation of searchable database encryption system, Computer Technology and Development, 27, 8, pp. 130-134, (2017)
[4]
Cash D., Jaeger J., Jarecki S., Et al., Dynamic searchable encryption in very-large databases: Data structures and implementation, Proc of 2014 Network and Distributed System Security Symp, (2014)
[5]
Faber S., Jarecki S., Krawczyk H., Et al., Rich queries on encrypted data: Beyond exact matches, Proc of the 20th European Symp on Research in Computer Security, pp. 123-145, (2015)
[6]
Chase M., Shen E., Substring-searchable symmetric encryption, Proc of the 15th Privacy Enhancing Technologies Symp, pp. 263-281, (2015)
[7]
Hu C., Han L., Efficient wildcard search over encrypted data, International Journal of Information Security, 15, 5, pp. 539-547, (2016)
[8]
Zhou W., Liu L., Jing H., Et al., K-Gram based fuzzy keyword search over encrypted loud computing, Journal of Software Engineering and Applications, 6, 1, pp. 29-32, (2013)
[9]
Zhang Z., Marios H., Beng C.O., Et al., Bed-Tree: An all-purpose index structure for string similarity search based on edit distance, Proc of the ACM Special Interest Group on Management of Data, pp. 915-926, (2010)
[10]
Leontiadis I., Li M., Storage efficient substring searchable symmetric encryption, Proc of the 39th Annual IACR Scientific Conf, (2017)