|
[1]B. H. Bloom, “Space/Time Trade-offs in Hash Coding with Allowable Errors,” In Communications of the ACM, pp.422-426, July 1970. [2]Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W, “Experiments with Queries over Encrypted Data Using Secret Sharing,” In Secure Data Management (SDM), pp.33-46, 2005. [3]D. Boneh, G.D. Crescenzo, R. Ostrovsky and G. Persiano, “Public Key Encryption with Keyword Search,” In Proceedings of IEEE Symposium on Security and Privacy, pp.44-45 IEEE, Apr 2004. [4]D. Song, D. Wagner and A. Perrig, “Practical Techniques for Searches on Encrpted Data,” In Advances in Cryptology - EUROCRYPT 2004, pp.506-522, May 2000. [5]E-J. Goh, “Secure Indexes,” In The Cryptology ePrint Archive, Report 2003/216, Mar 16, 2004. [6]G. Amanatidis, A. Boldyreva, and A. O’Neill, “New security models and provably-secure schemes for basic query support in outsourced databases,” In Working Conference on Data and Applications Security (DBSec ’07), 2007. [7]J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,” In Cryptology ePrint Archive, 2005. [8]L.T.A. Joseph, A. Samsudin and B. Belaton, “Efficient Search on Encrypted Data”, In Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication, pp.6, Nov 2005. [9]M. Bellare, A. Boldyreva and A. O’Neill, “Deterministic and Efficiently Searchable Encryption”, In Advances in Cryptology - CRYPTO 2007, pp.535-552, Aug 2007. [10]M. Freedman, Y. Ishai, B. Pinkas and O. Reingold, “Keyword Search and Oblivious Pseudorandom Functions,” In Proceedings of 2nd Theory of Cryptography Conference (TCC ''05) Cambridge, Feb 2005. [11]R. Brinkman, L. Feng, J. M. Doumen, P. H. Hartel, and W. Jonker, “Efficient tree search in encrypted data,” In Technical Report TR-CTIT-04-15, Mar 2004. [12]R. Brinkman, L. Feng, S. Etalle, P.H. Hartel and W. Jonker, “Experimenting with linear search in encrypted data,” In Center for Telematics and Information Technology, University of Twente, Dec 2005. [13]R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” In ACM conference on Computer and communications security, pp.79-88 ACM CCS 2006. [14]S. Bellovin and W. Cheswick, “Privacy-enhanced searches using encrypted bloom filters,” In Cryptology ePrint Archive, 2004. [15]S. Artzi, A. Kiezun, C. Newport and D. Schultz, “Encrypted Keyword Search in a Distributed Storage System,” Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory, 2006. [16]Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Cliff Stein, Introduction to Algorithms, 2th ed., MIT Press and McGraw-Hill, pp.221-252, 2001.
|