4.7 Article

A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents

Han Fang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2020)

Article Computer Science, Information Systems

Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)

Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

Raphael Bost et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

An Efficient Privacy-Preserving Ranked Keyword Search Method

Chi Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

Zhangjie Fu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Zhihua Xia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks Against Searchable Encryption

David Cash et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Ning Cao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Theory & Methods

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

An efficient public key encryption with conjunctive-subset keywords search

Bo Zhang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

Reversible data hiding

ZC Ni et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2006)