共 94 条
- [1] Ateniese G(2006)Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans Inf Syst Secur 9 1-30
- [2] Fu K(2015)New algorithms for secure outsourcing of large-scale systems of linear equations IEEE Trans Inf Forens Secur 10 69-78
- [3] Green M(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
- [4] Hohenberger S(2015)Speks: secure server-designation public key encryption with keyword search against keyword guessing attacks Comput J 58 922-933
- [5] Chen X(2015)A taxonomic view of cloud computing services Int J Comput Sci Eng 11 17-28
- [6] Huang X(2018)Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack Inform Sci 444 72-88
- [7] Li J(2016)Public-key encryption with keyword search secure against continual memory attacks Secur Commun Netw 9 1613-1629
- [8] Ma J(2004)Access control language for multidomain environments IEEE Internet Comput 8 40-50
- [9] Wong D(2015)Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage IEEE Transa Emerg Topics Comput 3 127-138
- [10] Lou W(2018)Personalized search over encrypted data with efficient and secure updates in mobile clouds IEEE Trans Emerg Topics Comput 6 97-109