|
[1]D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, 2000, pp. 44-55. [2]S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proceedings of the 2012 ACM conference on Computer and communications security, 2012, pp. 965-976. [3]D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," in Network and Distributed System Security Symposium, NDSS, 2014. [4]E. Stefanov, C. Papamanthou, and E. Shi, "Practical Dynamic Searchable Encryption with Small Leakage," in Network and Distributed System Security Symposium, NDSS, 2014. [5]M. Naveed, M. Prabhakaran, and C. A. Gunter, "Dynamic searchable encryption via blind storage," in Security and Privacy (SP), 2014 IEEE Symposium on, 2014, pp. 639-654. [6]F. Hahn and F. Kerschbaum, "Searchable Encryption with Secure and Efficient Updates," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014, pp. 310-320. [7]O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications: Cambridge University Press, 2004. [8]E.-J. Goh, "Secure Indexes," IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003. [9]Y.-C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," in Applied Cryptography and Network Security. vol. 3531, J. Ioannidis, A. Keromytis, and M. Yung, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 442-455. [10]R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," Journal of Computer Security, vol. 19, pp. 895-934, 2011. [11]K. Kurosawa and Y. Ohtaki, "UC-Secure Searchable Symmetric Encryption," in Financial Cryptography and Data Security. vol. 7397, A. Keromytis, Ed., ed: Springer Berlin Heidelberg, 2012, pp. 285-298. [12]A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption," in Advances in Cryptology – EUROCRYPT 2010. vol. 6110, H. Gilbert, Ed., ed: Springer Berlin Heidelberg, 2010, pp. 62-91. [13]S. Kamara and C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," in Financial Cryptography and Data Security, ed: Springer, 2013, pp. 258-274. [14]R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," presented at the Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2006. [15]C. Bosch, A. Peter, B. Leenders, L. Hoon Wei, T. Qiang, W. Huaxiong, et al., "Distributed Searchable Symmetric Encryption," in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 330-337. [16]W. Dai. (2013, Feb. 20). Crypto++ Library 5.6.2 [Online]. Available: http:/www.cryptopp.com [17]J. Song, R. Poovendran, J. Lee, and T. Iwata, "The advanced encryption standard-cipher-based message authentication code-pseudo-random function-128 (AES-CMAC-PRF-128) algorithm for the internet key exchange protocol (IKE)," RFC 4615, Aug. 2006. [18]W. W. Cohen. (2015). Enron Email Dataset [Online]. Available: https://www.cs.cmu.edu/~./enron/
|