Related references
Note: Only part of the references are listed.Forward/Backward and Content Private DSSE for Spatial Keyword Queries
Xiangyu Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap
Feng Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data
Feng Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)
Forward and Backward Private DSSE for Range Queries
Cong Zuo et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection
Zheli Liu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Achieving Searchable Encryption Scheme With Search Pattern Hidden
Yunling Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings
Yingying Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
ROSE: Robust Searchable Encryption With Forward and Backward Security
Peng Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
Xinrui Ge et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud
Fan Yin et al.
COMPUTERS & SECURITY (2021)
P2HBT: Partially Policy Hidden E-Healthcare System with Black-Box Traceability
Ying Zuobin et al.
CHINESE JOURNAL OF ELECTRONICS (2021)
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Yinbin Miao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset
Jianting Ning et al.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)
DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy
Chenghong Wang et al.
SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2021)
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption
Qiyang Song et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud
Wenyuan Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data
Jing Chen et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
Hong Zhong et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
Xiangyu Wang et al.
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)
Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data
Xiaofeng Ding et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing
Yinbin Miao et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)
Passive Attacks Against Searchable Encryption
Jianting Ning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost
Nicholas Mainardi et al.
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA) (2019)
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Hardening Database Padding for Searchable Encryption
Lei Xu et al.
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)
Semantic-Aware Searching Over Encrypted Data for Cloud Computing
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
Jie Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)
Enabling verifiable multiple keywords search over encrypted cloud data
Yinbin Miao et al.
INFORMATION SCIENCES (2018)
Efficient Searchable Encryption Through Compression
Ioannis Demertzis et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2018)
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis et al.
SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING (2018)
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
Shi-Feng Sun et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Shangqi Lai et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
New Constructions for Forward and Backward Private Symmetric Searchable Encryption
Javad Ghareh Chamani et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
Practical and Secure Substring Search
Florian Hahn et al.
SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2018)
Substring search over encrypted data
Tarik Moataz et al.
JOURNAL OF COMPUTER SECURITY (2018)
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
Xiuxiu Jiang et al.
INFORMATION SCIENCES (2017)
Fast Searchable Encryption With Tunable Locality
Ioannis Demertzis et al.
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2017)
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates
Kee Sung Kim et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Searchable Symmetric Encryption: Designs and Challe
Geong Sen Poh et al.
ACM COMPUTING SURVEYS (2017)
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
Hongwei Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
A Web Traffic Analysis Attack Using Only Timing Information
Saman Feghhi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
An Efficient Privacy-Preserving Ranked Keyword Search Method
Chi Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhihua Xia et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption
David Pouliot et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Generic Attacks on Secure Outsourced Databases
Georgios Kellaris et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Σοφοζ - Forward Secure Searchable Encryption
Raphael Bost
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Executing Boolean Queries on an Encrypted Bitmap Index
Mohamed Ahmed Abdelraheem et al.
CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP (2016)
Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
Hongwei Li et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2015)
A Survey of Provably Secure Searchable Encryption
Christoph Bosch et al.
ACM COMPUTING SURVEYS (2015)
Substring Position Search over Encrypted Cloud Data using Tree-based Index
Mikhail Strizhov et al.
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015) (2015)
Leakage-Abuse Attacks Against Searchable Encryption
David Cash et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
Zhangjie Fu et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Ning Cao et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Search pattern leakage in searchable encryption: Attacks and new construction
Chang Liu et al.
INFORMATION SCIENCES (2014)
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
Rui Li et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2014)
Efficient Fuzzy Search Engine with B -Tree Search Mechanism
Simran Bijral et al.
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT) (2014)
Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jianfeng Wang et al.
COMPUTER SCIENCE AND INFORMATION SYSTEMS (2013)
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
Jiadi Yu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Cong Wang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
Secure multidimensional range queries over outsourced data
Bijit Hore et al.
VLDB JOURNAL (2012)
Position heaps: A simple and dynamic text indexing data structure
Andrzej Ehrenfeucht et al.
JOURNAL OF DISCRETE ALGORITHMS (2011)