共 17 条
- [1] Vaquero L.M., Rodero-Merino L., Caceres J., Lindner M.A., A break in the clouds: Towards a cloud definition, ACM SIGCOMM Computer Communication Review, 39, 1, pp. 50-55, (2009)
- [2] Kamara S., Lauter K., Cryptographic cloud storage, Proceedings of the Financial Cryptography Workshops, pp. 136-149, (2010)
- [3] Cao N., Wang C., Li M., Ren K., Lou W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pp. 829-837, (2011)
- [4] Hacigumus H., Iyer B., Mehrotra S., Providing database as a service, Proceedings of the 18th International Conference on Data Engineering (ICDE 2002), pp. 29-40, (2002)
- [5] Song D., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proceedings of the IEEE Symposium on Security and Privacy (S&P 2000), pp. 44-55, (2000)
- [6] Wong W.K., Cheung D.W., Kao B., Mamoulis N., Secure kNN computation on encrypted databases, Proceedings of the 35th International Conference on Management of Data (SIGMOD 2009), pp. 139-152, (2009)
- [7] Goh E.-J., Secure indexes, (2003)
- [8] Boneh D., Crescenzo G., Ostrovsky R., Persiano G., Public key encryption with keyword search, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004), pp. 506-522, (2004)
- [9] Boneh D., Kushilevitz E., Ostrovsky R., Skeith III W.E., Public key encryption that allows PIR queries, Proceedings of the 27th Annual International Cryptology Conference (CRYPTO 2007), pp. 50-67, (2007)
- [10] Curtmola R., Garay J.A., Kamara S., Ostrovsky R., Searchable symmetric encryption: Improved definitions and efficient constructions, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88, (2006)