Authorized keyword search on encrypted data

J Shi, J Lai, Y Li, RH Deng, J Weng - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Cloud computing has drawn much attention from research and industry in recent years.
Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those …

[引用][C] Authorized Keyword Search on Encrypted Data

J Shi, J Lai, Y Li, RH Deng, J Weng - Computer Security-ESORICS 2014, 2014 - cir.nii.ac.jp
Authorized Keyword Search on Encrypted Data | CiNii Research CiNii 国立情報学研究所
学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データをさがす 大学 …

Authorized Keyword Search on Encrypted Data

J SHI, J Lai, Y LI, HR DENG, J Weng - 2014 - ink.library.smu.edu.sg
Cloud computing has drawn much attention from research and industry in recent years.
Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those …

Authorized Keyword Search on Encrypted Data

J Shi, J Lai, Y Li, RH Deng, J Weng - European Symposium on Research …, 2014 - dl.acm.org
Cloud computing has drawn much attention from research and industry in recent years.
Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those …

[PDF][PDF] Authorized Keyword Search on Encrypted Data.(2014)

J SHI, J Lai, Y LI, HR DENG… - Computer Security …, 2014 - ink.library.smu.edu.sg
Cloud computing has drawn much attention from research and industry in recent years.
Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those …