共 158 条
- [1] Abdalla M(2005)Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions Crypto, Springer 3621 205-222
- [2] Bellare M(2015)Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes Int J Cloud Appl Comput (IJCAC) 5 35-52
- [3] Catalano D(2004)Public key encryption with keyword search Eurocrypt, Springer 3027 506-522
- [4] Kiltz E(2016)Dual-server public-key encryption with keyword search for secure cloud storage IEEE Trans Inf Forensics Secur 11 789-798
- [5] Kohno T(1976)New directions in cryptography IEEE Trans Inf Theory 22 644-654
- [6] Lange T(2017)Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment Neural Comput Appl 28 3655-3682
- [7] Malone-Lee J(2017)Cloud-assisted secure video transmission and sharing framework for smart cities Future Gener Comput Syst 83 569-606
- [8] Neven G(2017)An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Inf Sci 403 1-14
- [9] Paillier P(2017)Homomorphic encryption as a service for outsourced images in mobile cloud computing environment Int J Cloud Appl Comput (IJCAC) 7 27-40
- [10] Shi H(2009)Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32 394-396