Effective error-tolerant keyword search for secure cloud computing
From MaRDI portal
Publication:458133
DOI10.1007/S11390-014-1413-1zbMath1296.68046OpenAlexW1982193258MaRDI QIDQ458133
Xiao-Qiong Pang, Dan Xie, Jun-Qiang Du, Bo Yang
Publication date: 7 October 2014
Published in: Journal of Computer Science and Technology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11390-014-1413-1
Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20)
Cites Work
- Computing arbitrary functions of encrypted data
- Oblivious RAM Revisited
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Public Key Encryption That Allows PIR Queries
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Software protection and simulation on oblivious RAMs
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Effective error-tolerant keyword search for secure cloud computing