Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1]Jingbo Yan, Yuqing Zhang, Xuefeng Liu,” Secure multi-keyword search supporting dynamic update and ranked retrieval,” Communication Technology (ICT)., Volume: 13, Issue: 10. [2] SONG D, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy, 2000: 44-45. [3] BOSCH C, HARTEL P, JONKER W, et al. A Survey of Provably Secure Searchable Encryption [J].ACM Computing Surveys, 2015, 47(2): 1-51. [4] GOLLE P, STADDON J, and WATERS B. Secure Conjunctive Keyword Search over Encrypted Data[C]// Proceedings of Applied Cryptography and Network Security (ACNS), June 8-11, 2004:31-45. [5] SUN Wenhai, WANG Bing, CAO Ning, et al. Verifiable Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking [J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(11):71-82. [6] CAO Ning, WANG Cong, LI Ming, et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233. [7] XIA Zhihua, WANG Xinhui, SUN Xingming, et al.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. [8] KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption[C]//Proceedings of the 2012 ACM conference on Computer and communications security (CCS),2012: 965-976. [9] CASH D, JAEGER J, JARECKI S. Dynamic Searchable Encryption in Very-Large Databases: Date Structures and Implementation[C]// Network & Distributed System Security Symposium (NDSS),February 23-26, 2014. [10] KAMARA S, PAPAMANTHOU C. Parallel and dynamic, searchable symmetric encryption[C]//Proceedings of Financial Cryptography and Data Security (FC), April 1-5, 2013: 258-274. [11] BISHOP A, JAIN A, KOWALCZYK L. Function-Hiding Inner Product Encryption[C]//Proceedings of Advances in Cryptology—ASIAic [12] A.Raghavendra Praveen Kumar, K.Tarakesh,U.Veeresh,” A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted.” International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 1137-1141, 2015. [13] Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA,” A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing .” International Journal of Computer Engineering In Research Trends., vol.3, no.6, pp. 308-313, 2016. [14] G.Lucy, D.Jaya Narayana Reddy, R.Sandeep Kumar,” Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.” International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 919-923, 2015. [15] G.Dileep Kumar, A.Sreenivasa Rao,” Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data.” International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 767-770, 2015.
![]() | V4I8007.pdf |