Pages that link to "Item:Q3058680"
From MaRDI portal
The following pages link to Structured Encryption and Controlled Disclosure (Q3058680):
Displaying 25 items.
- Searchable symmetric encryption over multiple servers (Q680933) (← links)
- Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound (Q1631324) (← links)
- A survey on design and implementation of protected searchable data in the cloud (Q1686146) (← links)
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components (Q1755999) (← links)
- Structured encryption and dynamic leakage suppression (Q2056799) (← links)
- Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model (Q2096495) (← links)
- Improved structured encryption for SQL databases via hybrid indexing (Q2117069) (← links)
- Encrypted key-value stores (Q2152022) (← links)
- A privacy-preserving multi-keyword search approach in cloud computing (Q2152914) (← links)
- Deniable searchable symmetric encryption (Q2293186) (← links)
- PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries (Q2656784) (← links)
- The Feasibility of Outsourced Database Search in the Plain Model (Q2827726) (← links)
- TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption (Q2829960) (← links)
- Structured encryption algorithm for text cryptography (Q5031943) (← links)
- Inner magic and inner antimagic graphs in cryptography (Q5036744) (← links)
- LEXICOGRAPHIC LABELED GRAPHS IN CRYPTOGRAPHY (Q5076140) (← links)
- Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations (Q5157397) (← links)
- Privacy-Preserving Subgraph Matching Protocol for Two Parties (Q5205011) (← links)
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity (Q5270359) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates (Q5854428) (← links)
- Tight tradeoffs in searchable symmetric encryption (Q5925503) (← links)
- Locality-preserving oblivious RAM (Q5925543) (← links)
- Structured encryption for knowledge graphs (Q6191637) (← links)
- Multi-user image retrieval with suppression of search pattern leakage (Q6195205) (← links)