| 1 |
Public Key Encryption with Keyword Search  |
미소장 |
| 2 |
Conjunctive, Subset, and Range Queries on Encrypted Data  |
미소장 |
| 3 |
Privacy Preserving Keyword Searches on Remote Encrypted Data  |
미소장 |
| 4 |
E.J. Goh, “Secure Incexes,” Technical report 2003-216, In IACR ePrint Cryptography Archive, 2003. |
미소장 |
| 5 |
Secure Conjunctive Keyword Search over Encrypted Data  |
미소장 |
| 6 |
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System  |
미소장 |
| 7 |
Oblivious keyword search  |
미소장 |
| 8 |
R. Richardson, “2007 CSI Computer Crime and Security Survey,” The 12th Annual report of computer security society, CSI, 2007. |
미소장 |
| 9 |
D.X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” In Symposium on Security and Privacy IEEE, pp. 44-55, May 2000. |
미소장 |