1 |
J. Baek, R. Safavi-Naini, and W. Susilo, "Public key encryption with keyword search revisited," Proc. ICCSA 2008, LNCS 5072, pp. 1249-1259, 2008.
|
2 |
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," Proc. EUROCRYPT 2004, LNCS 3027, pp. 506-522, 2004.
|
3 |
J.W. Byun, H.S. Rhee, H.A. Park, and D.H. Lee, "Off-line keyword guessing attacks on recent keyword search schemes over encrypted data," Proc. SDM 2006, LNCS 4165, pp. 75-83, 2006.
|
4 |
H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee, "Improved searchable Public key encryption with designated tester," Proc. ASIACCS 2009, pp. 376-379, March 2009.
|
5 |
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searching on encrypted data," Pro. IEEE Symposium on Security and Privacy, pp. 44-55, May 2000.
|
6 |
연합뉴스, "사상 최대 고객정보유출...'잠자는' 제도", 2010.03.12.(http://www.yonhapnews.co.kr/bulletin/2010/03/12/0200000000AKR20100312128000017.HTML)
|