共 28 条
[1]
[Anonymous], 2003, CRYPTOLOGY EPRINT AR
[2]
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-319-02937-517
[3]
[Anonymous], 2014, NETWORK DISTRIBUTED
[4]
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:787-796
[5]
Asharov G., 2016, 2016251 CRYPT EPRINT
[7]
Broder A, 2005, PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P195
[8]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[9]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[10]
Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20