共 10 条
[1]
[Anonymous], LNCS
[2]
Chang C., 2005, APPL CRYPTOGRAPHY NE
[3]
A model to compare cloud and non-cloud storage of Big Data
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 57
:56-76
[4]
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[5]
Goh E., 2003, IACR CRYPTOLOGY EPRI, V216
[6]
Secure conjunctive keyword search over encrypted data
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS,
2004, 3089
:31-45
[7]
Kurosawa K., 2012, FINANCIAL CRYPTOGRAP
[8]
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[9]
Yan LA, 2009, LECT NOTES COMPUT SC, V5931, P167