共 40 条
[1]
Akavia Adi, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P87, DOI 10.2478/popets-2019-0038
[2]
Secure Search on Encrypted Data via Multi-Ring Sketch
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:985-1001
[3]
Searchable encryption on the cloud: a survey
[J].
JOURNAL OF SUPERCOMPUTING,
2022, 78 (07)
:9952-9984
[4]
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[5]
Baror SO, 2019, INT C CYBER WARFARE, P505
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Investigating Characteristics of Attacks on Public Cloud Systems
[J].
2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019),
2019,
:89-94
[8]
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75