共 92 条
- [1] Song X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proc of IEEE Symp on Security and Privacy 2000, pp. 44-55, (2000)
- [2] Boneh D., Kushilevitz E., Ostrovsky R., Public Key encryption with keyword search, LNCS 3027: Proc of Eurocrypt 2004, pp. 506-522, (2004)
- [3] Waters B., Balfanz D., Durfee G., Building an encrypted and searchable audit log, Proc of NDSS 2004, pp. 5-6, (2004)
- [4] Golle P., Staddon J., Waters B., Secure conjunctive keyword search over encrypted data, Proc of ACNS 2004, pp. 31-45, (2004)
- [5] Park D.J., Kim K., Lee P.J., Public key encryption with conjunctive field keyword search, Information Security Applications, 3325, pp. 73-86, (2005)
- [6] Curtmola R., Garay J.A., Kamara S., Et al., Searchable symmetric encryption: Improved definitions and efficient constructions, Proc of ACM CCS 2006, pp. 79-88, (2006)
- [7] Wang P., Wang H., Pieprzyk J., Threshold privacy preserving keyword searches, Proc of SOFSEM 2008, pp. 646-658, (2008)
- [8] Park D.J., Cha J.Y., Lee P.J., Searchable keyword-based encryption, 2005/367, (2005)
- [9] Baron J., Defrawy K.E., Minkovich K., Et al., R.5pm: Secure pattern matching, Proc of the 8th Int Conf on Security and Cryptography for Networks, pp. 222-240, (2012)
- [10] Hazay C., Toft T., Computationally secure pattern matching in the presence of malicious adversaries, Proc of ASIACRYPT 2010, pp. 195-212, (2010)