共 35 条
[1]
[Anonymous], 2015, IACR Cryptol. ePrint Arch.
[2]
Asghar M.R., 2013, P ACM WORKSHOP CLOUD, P77
[3]
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[4]
Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
[5]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]
Bösch C, 2014, ANN CONF PRIV SECUR, P330, DOI 10.1109/PST.2014.6890956
[7]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482
[8]
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[9]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[10]
Chen GX, 2018, IEEE INFOCOM SER, P810, DOI 10.1109/INFOCOM.2018.8486381