[1] |
JIANG Q , MA J F , WEI F S . On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2017,PP(99): 1-4.
|
[2] |
JIANG Q , KHAN M K , LU X ,et al. A privacy preserving three-factor authentication protocol for e-health clouds[J]. Journal of Supercomputing, 2016,72(10): 3826-3849.
|
[3] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security and Privacy. 2000: 44-55.
|
[4] |
BONEH D , DI C G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522.
|
[5] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// The 29th IEEE International Conference on Computer Communications. 2010: 1-5.
|
[6] |
CHEN R , MU Y , YANG G ,et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2016,11(4): 789-798.
|
[7] |
MIAO Y , MA J , WEI F ,et al. VCSE:verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-Peer Networking and Applications, 2016: 1-13.
|
[8] |
LI H , LIU D , JIA K ,et al. Achieving authorized and ranked multi-keyword search over encrypted cloud data[C]// IEEE International Conference on Communications. 2015: 7450-7455.
|
[9] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007: 321-334.
|
[10] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM conference on Computer and communications security. 2006: 89-98.
|
[11] |
ZHENG Q , XU S , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// IEEE Conference on Computer Communications. 2014: 522-530.
|
[12] |
LIU Z , WENG J , LI J ,et al. Cloud-based electronic health record system supporting fuzzy keyword search[J]. Soft Computing, 2015: 1-13.
|
[13] |
MIAO Y , LIU J , MA J . Fine-grained searchable encryption over encrypted data in multi-clouds[C]// The 10th International Conference on Wireless Algorithms,Systems,and Applications. 2015: 407-416.
|
[14] |
QIAN H , LI J , ZHANG Y ,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J]. International Journal of Information Security. 2014,14(6): 1-11.
|
[15] |
YANG Y . Attribute-based data retrieval with semantic keyword search for e-health cloud[J]. Journal of Cloud Computing. 2015,4(1): 1-6.
|
[16] |
LI M , YU S , CAO N ,et al. Authorized private keyword search over encrypted data in cloud computing[C]// International Conference on Distributed Computing Systems. 2011: 383-392.
|
[17] |
SUN W , YU S , LOU W ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the Cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198.
|