Searchable symmetric encryption (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Searchable symmetric encryption" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
low place
low place
5th place
5th place
5,032nd place
3,357th place
69th place
59th place
102nd place
76th place
274th place
309th place

arxiv.org

doi.org

doi.org

  • Dawn Xiaoding Song; Wagner, D.; Perrig, A. (2000). "Practical techniques for searches on encrypted data". Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. IEEE Comput. Soc. pp. 44–55. doi:10.1109/secpri.2000.848445. ISBN 0-7695-0665-8. S2CID 2829840.
  • Curtmola, Reza; Garay, Juan; Kamara, Seny; Ostrovsky, Rafail (2006-10-30). "Searchable symmetric encryption". Proceedings of the 13th ACM conference on Computer and communications security. CCS '06. Alexandria, Virginia, USA: Association for Computing Machinery. pp. 79–88. doi:10.1145/1180405.1180417. ISBN 978-1-59593-518-2. S2CID 961719.
  • Amorim, Ivone; Costa, Ivan (2023-07-01). "Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis". Mathematics. 11 (13): 2948. arXiv:2306.14407. doi:10.3390/math11132948. ISSN 2227-7390.
  • Goldreich, Oded; Ostrovsky, Rafail (May 1996). "Software protection and simulation on oblivious RAMs". Journal of the ACM. 43 (3): 431–473. doi:10.1145/233551.233553. hdl:1721.1/103684. ISSN 0004-5411. S2CID 7502114.
  • Chang, Yan-Cheng; Mitzenmacher, Michael (2005). "Privacy Preserving Keyword Searches on Remote Encrypted Data". In Ioannidis, John; Keromytis, Angelos; Yung, Moti (eds.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. Berlin, Heidelberg: Springer. pp. 442–455. doi:10.1007/11496137_30. ISBN 978-3-540-31542-1.
  • Kamara, Seny; Papamanthou, Charalampos; Roeder, Tom (2012-10-16). "Dynamic searchable symmetric encryption". Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. New York, NY, USA: Association for Computing Machinery. pp. 965–976. doi:10.1145/2382196.2382298. ISBN 978-1-4503-1651-4. S2CID 243046.
  • Chase, Melissa; Kamara, Seny (2010). "Structured Encryption and Controlled Disclosure". In Abe, Masayuki (ed.). Advances in Cryptology - ASIACRYPT 2010. Lecture Notes in Computer Science. Vol. 6477. Berlin, Heidelberg: Springer. pp. 577–594. doi:10.1007/978-3-642-17373-8_33. ISBN 978-3-642-17373-8.
  • Cash, David; Jarecki, Stanislaw; Jutla, Charanjit; Krawczyk, Hugo; Roşu, Marcel-Cătălin; Steiner, Michael (2013). "Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries". In Canetti, Ran; Garay, Juan A. (eds.). Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. Vol. 8042. Berlin, Heidelberg: Springer. pp. 353–373. doi:10.1007/978-3-642-40041-4_20. ISBN 978-3-642-40041-4.
  • Pappas, Vasilis; Krell, Fernando; Vo, Binh; Kolesnikov, Vladimir; Malkin, Tal; Choi, Seung Geol; George, Wesley; Keromytis, Angelos; Bellovin, Steve (May 2014). "Blind Seer: A Scalable Private DBMS". 2014 IEEE Symposium on Security and Privacy. IEEE. pp. 359–374. doi:10.1109/sp.2014.30. ISBN 978-1-4799-4686-0. S2CID 9165575.
  • Amjad, Ghous; Kamara, Seny; Moataz, Tarik (2019-01-01). "Breach-Resistant Structured Encryption". Proceedings on Privacy Enhancing Technologies. 2019 (1): 245–265. doi:10.2478/popets-2019-0014. S2CID 4047057.
  • Kamara, Seny; Moataz, Tarik; Ohrimenko, Olya (2018). "Structured Encryption and Leakage Suppression". In Shacham, Hovav; Boldyreva, Alexandra (eds.). Advances in Cryptology – CRYPTO 2018. Lecture Notes in Computer Science. Vol. 10991. Cham: Springer International Publishing. pp. 339–370. doi:10.1007/978-3-319-96884-1_12. ISBN 978-3-319-96884-1. S2CID 51603585.
  • Grubbs, Paul; Ristenpart, Thomas; Shmatikov, Vitaly (2017-05-07). "Why Your Encrypted Database is Not Secure". Proceedings of the 16th Workshop on Hot Topics in Operating Systems. HotOS '17. New York, NY, USA: Association for Computing Machinery. pp. 162–168. doi:10.1145/3102980.3103007. ISBN 978-1-4503-5068-6. S2CID 10111288.
  • Yao, Jing; Zheng, Yifeng; Guo, Yu; Wang, Cong (2020-10-06). "SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search". Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing. SBC '20. New York, NY, USA: Association for Computing Machinery. pp. 14–20. doi:10.1145/3384942.3406869. ISBN 978-1-4503-7609-9. S2CID 222179683.

dx.doi.org

  • Dawn Xiaoding Song; Wagner, D.; Perrig, A. (2000). "Practical techniques for searches on encrypted data". Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. IEEE Comput. Soc. pp. 44–55. doi:10.1109/secpri.2000.848445. ISBN 0-7695-0665-8. S2CID 2829840.
  • Goldreich, Oded; Ostrovsky, Rafail (May 1996). "Software protection and simulation on oblivious RAMs". Journal of the ACM. 43 (3): 431–473. doi:10.1145/233551.233553. hdl:1721.1/103684. ISSN 0004-5411. S2CID 7502114.

handle.net

hdl.handle.net

iacr.org

eprint.iacr.org

ndss-symposium.org

semanticscholar.org

api.semanticscholar.org

  • Dawn Xiaoding Song; Wagner, D.; Perrig, A. (2000). "Practical techniques for searches on encrypted data". Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. IEEE Comput. Soc. pp. 44–55. doi:10.1109/secpri.2000.848445. ISBN 0-7695-0665-8. S2CID 2829840.
  • Curtmola, Reza; Garay, Juan; Kamara, Seny; Ostrovsky, Rafail (2006-10-30). "Searchable symmetric encryption". Proceedings of the 13th ACM conference on Computer and communications security. CCS '06. Alexandria, Virginia, USA: Association for Computing Machinery. pp. 79–88. doi:10.1145/1180405.1180417. ISBN 978-1-59593-518-2. S2CID 961719.
  • Goldreich, Oded; Ostrovsky, Rafail (May 1996). "Software protection and simulation on oblivious RAMs". Journal of the ACM. 43 (3): 431–473. doi:10.1145/233551.233553. hdl:1721.1/103684. ISSN 0004-5411. S2CID 7502114.
  • Kamara, Seny; Papamanthou, Charalampos; Roeder, Tom (2012-10-16). "Dynamic searchable symmetric encryption". Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. New York, NY, USA: Association for Computing Machinery. pp. 965–976. doi:10.1145/2382196.2382298. ISBN 978-1-4503-1651-4. S2CID 243046.
  • Pappas, Vasilis; Krell, Fernando; Vo, Binh; Kolesnikov, Vladimir; Malkin, Tal; Choi, Seung Geol; George, Wesley; Keromytis, Angelos; Bellovin, Steve (May 2014). "Blind Seer: A Scalable Private DBMS". 2014 IEEE Symposium on Security and Privacy. IEEE. pp. 359–374. doi:10.1109/sp.2014.30. ISBN 978-1-4799-4686-0. S2CID 9165575.
  • Amjad, Ghous; Kamara, Seny; Moataz, Tarik (2019-01-01). "Breach-Resistant Structured Encryption". Proceedings on Privacy Enhancing Technologies. 2019 (1): 245–265. doi:10.2478/popets-2019-0014. S2CID 4047057.
  • Kamara, Seny; Moataz, Tarik; Ohrimenko, Olya (2018). "Structured Encryption and Leakage Suppression". In Shacham, Hovav; Boldyreva, Alexandra (eds.). Advances in Cryptology – CRYPTO 2018. Lecture Notes in Computer Science. Vol. 10991. Cham: Springer International Publishing. pp. 339–370. doi:10.1007/978-3-319-96884-1_12. ISBN 978-3-319-96884-1. S2CID 51603585.
  • Grubbs, Paul; Ristenpart, Thomas; Shmatikov, Vitaly (2017-05-07). "Why Your Encrypted Database is Not Secure". Proceedings of the 16th Workshop on Hot Topics in Operating Systems. HotOS '17. New York, NY, USA: Association for Computing Machinery. pp. 162–168. doi:10.1145/3102980.3103007. ISBN 978-1-4503-5068-6. S2CID 10111288.
  • Yao, Jing; Zheng, Yifeng; Guo, Yu; Wang, Cong (2020-10-06). "SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search". Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing. SBC '20. New York, NY, USA: Association for Computing Machinery. pp. 14–20. doi:10.1145/3384942.3406869. ISBN 978-1-4503-7609-9. S2CID 222179683.

springer.com

link.springer.com

worldcat.org

search.worldcat.org