P Liu, J Wang, H Ma, H Nie - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
As a very attractive cryptographic primitive, the public key encryption with keyword search (PEKS) enables users to search on encrypted data, and hence is applicable to the setting of …
BK Samanthula, W Jiang, E Bertino - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
In the last decade, several techniques have been proposed to evaluate different types of queries (eg, range and aggregate queries) over encrypted data in a privacy-preserving …
Y Elmehdwi, W Jiang, A Hurson - Advances in Computers, 2014 - Elsevier
Due to its cost-efficiency, flexibility, and offload of administrative overhead, cloud computing has become a viable option for organizations to outsource their data and services. To protect …