共 37 条
[1]
[Anonymous], 2013, P ACM SIGSAC C COMP, DOI 10.1145/2508859.2516730
[2]
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[3]
Bao F., 2008, P ISPEC
[4]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[5]
Boyen X, 2008, LECT NOTES COMPUT SC, V5209, P39, DOI 10.1007/978-3-540-85538-5_3
[6]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[7]
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[8]
Rich Queries on Encrypted Data: Beyond Exact Matches
[J].
COMPUTER SECURITY - ESORICS 2015, PT II,
2015, 9327
:123-145
[9]
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:395-410
[10]
Goh E.-J., 2003, Report 2003/216