共 76 条
[1]
Ahsan MAM, 2017, INT CONF RES INNOV
[2]
Ali FS, 2016, 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), P260, DOI [10.1109/ICNISC.2016.82, 10.1109/ICNISC.2016.064]
[3]
[Anonymous], 2016, IACR CRYPTOL EPRINT
[4]
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[5]
Bost R., 2016, IACR Cryptol. ePrint Arch.
[6]
Cai CJ, 2017, IEEE ICC
[7]
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack
[J].
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1,
2013,
:339-346
[9]
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[10]
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442