1 |
D. Song, D. Wagner, and A. Perrig. 'Practical techniques for searches on encrypted data.' In Proceedings of IEEE Symposium on Security and Privacy, pages 44-55. IEEE, May 2000
|
2 |
Markus Jakobsson and Ari Juels. 'An Optimally Robust Hybrid Mix Network (Extended Abstract)' In the Proceedings of Principles of Distributed Computing - PODC '01, 2001
|
3 |
Y.-C. Chang and M. Mitzenmacher. 'Privacy preserving keyword searches on remote encrypted data.' Cryptology ePrint Archive, Report 2004/051, Feb 2004
|
4 |
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. 'Public-key encryption with keyword search.' In C. Cachin, editor, Proceedings of Eurocrypt 2004, LNCS. Springer-Verlag, May 2004
|
5 |
B. Waters, D. Balfanz, G. Durfee, and D. Smetters. 'Building an encrypted and searchable audit log.' In Proceedings of the 11th Network and Distributed System Security (NDSS) Symposium, pages 205-214. Internet Society (ISOC), Feb 2004
|
6 |
Eu-Jin Goh. 'Secure Indexes.' A early version of this paper first appeared on the Cryptology ePrint Archive on October 7th 2003. May 5, 2004
|
7 |
B. Bloom. 'Space/time trade-offs in hash coding with allowable errors.' Communications of the ACM, 13(7): 422-426, Jul 1970
DOI
|
8 |
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. 'Private information retrieval.' Journal of the ACM, 45(6):965-981, Nov 1998
DOI
ScienceOn
|
9 |
S. Bellovin and W. Cheswick. 'Privacy- enhanced searches using encrypted bloom filters.' Cryptology ePrint Archive, Report 2004/022, Feb 2004
|
10 |
UC Berkeley|CS 170: Ecient Algorithms and Intractable Problems Handout 10 Lecturer: David Wagner February 27, 2003
|
11 |
David Chaum. 'Untraceable electronic mail, return addresses, and digital pseudonyms' In Communications of the ACM 4(2), February 1981
|