[1]
|
冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83.
|
[2]
|
Weber, T. (2011) Cloud Computing after Amazon and Sony: Ready for Primetime?
http://www.bbc.co.uk/news/business-13451990
|
[3]
|
Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the Annual ACM Symposium on Theory of Computing, 9, 169-178. https://doi.org/10.1145/1536414.1536440
|
[4]
|
Goldreich, O. and Ostrovsky, R. (1992) Software Protection and Simulation on Oblivious RAMs. Massachusetts Institute of Technology, Cambridge.
|
[5]
|
Goh, E.J. (2003) Secure Indexes. Cryptology ePrint Archive.
|
[6]
|
Chang, Y.C. and Mitzenmacher, M. (2015) Privacy Preserving Keyword Searches on Remote Encrypted Data. Applied Cryptography and Network Security. Springer Berlin Heidelberg, 442-455.
|
[7]
|
Curtmola, R., Garay, J., Kamara, S., et al. (2011) Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security, 19, 79--88. https://doi.org/10.3233/jcs-2011-0426
|
[8]
|
Chase, M. and Kamara, S. (2010) Structured Encryption and Controlled Disclosure. Advances in Cryptology— ASIACRYPT 2010. Springer Berlin Heidelberg, 577-594. https://doi.org/10.1007/978-3-642-17373-8_33
|
[9]
|
Kamara, S., Papamanthou, C. and Roeder, T. (2012) Dynamic Searchable Symmetric Encryption. ACM Conference on Computer & Communications Security, October 2012, 965-976. https://doi.org/10.1145/2382196.2382298
|
[10]
|
Kurosawa, K. and Ohtaki, Y. (2012) UC-Secure Searchable Symmetric Encryption. Financial Cryptography and Data Security. Springer Berlin Heidelberg, 258-274. https://doi.org/10.1007/978-3-642-32946-3_21
|
[11]
|
Liesdonk, P.V., Sedghi, S., Doumen, J., et al. (2010) Computationally Efficient Searchable Symmetric Encryption. Secure Data Management, VLDB Workshop, SDM 2010, Singapore, 17 September 2010, 87-100.
https://doi.org/10.1007/978-3-642-15546-8_7
|
[12]
|
Kamara, S. and Papamanthou, C. (2013) Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. Springer Berlin Heidelberg, 258-274. https://doi.org/10.1007/978-3-642-39884-1_22
|
[13]
|
Katz, J. and Lindell, Y. (2007) Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series). Chapman & Hall/CRC, Stanford.
|
[14]
|
Neo4J Index Introduction (2016). https://neo4j.com
|