|
|
|
Mate Horvath,Istvan Vajda
Pág. 104 - 111
The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time. One line of research with this double motivation is the study&nbs...
ver más
|
|
|
|
|
|
|
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leakin...
ver más
|
|
|
|
|
|
|
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu
-
|
|
|
|
|
|
|
Mikhail Strizhov, Zachary Osman and Indrajit Ray
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the subs...
ver más
|
|
|
|