References
- Boneh. D., G.D. Crescenzo, R. Ostrovsky, "Public key encryption with keyword search", Adcances in Cryptology - EUROCRYPT, Interlaken, Switzerland, 2004, 506-522.
- Boneh, D., B. Waters, "Conjunctive, subset, and range queries on encrypted data", Theory of Cryptography. Amsterdam, Netherlands. 2007, 535-554.
- Droogenbroeck. M.V., R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images", Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002, 90-97.
- Droogenbroeck. M.V., "Partial encryption of images for real-time applications", Fourth IEEE Benelux Signal Processing, Belgium, 2004, 11-15.
- Kim, H.Y., "MS, BPOS 클라우드 데이터 유출", 2010, http://www.zdnet.co.kr/news/news_view.asp?artice_id=20101224105449 (Accessed June 09).
- Kim, K.M., S.Y. Nam, "Partial encryption algorithm based on block cipher algorithm", Proceedings of the 33th KSII Spring Conference, Kyoungsan, Korea, 2016, 119-120
- Kuranda, S., "The 10 Biggest Data Breaches of 2015", 2015, http://www.crn.com/slide-shows/security/300077563/the-10-biggest-data-breaches-of-2015-so-far.htm (Accessed June 09).
- Lee, D.Y., "2013년 최악의 데이터 유출 사고", 2014, www.itworld.co.kr/slideshow/86276 (Accessed June 09).
- Pandurange, H.T., S.K. Kumar, "Advanced partial image encryption using two-stage hill cipher technique" International Journal of Computer Application, Vol.60, No.16, 2012, 14-19. https://doi.org/10.5120/9775-4341
- Shi, E., H. Bethencourt, T.H. Chan, D. Song, A. Perrig, "Multi-dimensional range query over encrypted data", 2007 IEEE Symposium on Security and Privacy, Berkeley, USA, 2007, 350-364.
- Song, D., D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data", Security and Privacy, Berkeley, USA, 2000, 44-55.
- Takabi, H., J.B.D. Joshi, G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE SECURITY & PRIVACY, Vol.8 No.6, 2010, 24-31. https://doi.org/10.1109/MSP.2010.186