Privacy Preserving Keyword Searches on Remote Encrypted Data
Lecture notes in computer science2005pp. 442–455
Citations Over TimeTop 1% of 2005 papers
Related Papers
- → Public-key encryption based on generalized synchronization of coupled map lattices(2005)13 cited
- → Optical image asymmetric cryptosystem using fingerprint based on iterative fraction Fourier transform(2017)7 cited
- → Protecting SSD Data Against Attacks(2012)
- Several Attentive Problems in the Application of RSA Public Key Algorithm(2004)
- → A Novel Way of Issuing Multiple Private Keys in ID-based Cryptosystems(2007)