共 23 条
[1]
[Anonymous], 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS)
[2]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[3]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[4]
Chaudhari P., 2017, P INT C MATH COMP, P16
[5]
Chaudhari P, 2017, 2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), P47
[6]
On Anonymous Attribute Based Encryption
[J].
INFORMATION SYSTEMS SECURITY, (ICISS 2015),
2015, 9478
:378-392
[8]
Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach
[J].
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS),
2015,
:298-305
[9]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]
Jarecki S., 2013, P ACM SIGSAC C COMP, P875, DOI 10.1145/2508859.2516730