共 48 条
[1]
Alfonso V., 2014, PREDICTS 2015 INTERN
[2]
[Anonymous], 2019, IEEE T VEH TECHNOL, DOI DOI 10.1109/TVT.2019.2895834
[3]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482
[5]
Σοφοζ - Forward Secure Searchable Encryption
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1143-1154
[7]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[8]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[9]
New Constructions for Forward and Backward Private Symmetric Searchable Encryption
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1038-1055