共 19 条
[1]
[Anonymous], IEEE T INF FORENSICS
[2]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[4]
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[6]
Goh, 2004, SECURE INDEXES UNPUB
[7]
Secure conjunctive keyword search over encrypted data
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS,
2004, 3089
:31-45
[8]
Hans D., 2015, INTORDUCTION CRYPTOG
[9]
Kamara S., 2013, FINANCIAL CRYPTOGRAP, P258, DOI DOI 10.1007/978-3-642-39884-1