[1] |
Guo Lifeng, Li Zhihao, Hu Lei.
Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414.
|
[2] |
Lu Bingjie, Zhou Jun, Cao Zhenfu.
A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
[J]. Journal of Computer Research and Development, 2020, 57(10): 2104-2116.
|
[3] |
Yang Ningbin, Zhou Quan, Xu Shumei.
Public-Key Authenticated Encryption with Keyword Search Without Pairings
[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135.
|
[4] |
Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng.
Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206.
|
[5] |
Lai Chengzhe, Zhang Min, Zheng Dong.
A Secure and Efficient Map Update Scheme for Autonomous Vehicles
[J]. Journal of Computer Research and Development, 2019, 56(10): 2277-2286.
|
[6] |
Su Mang, Cao Mengyuan, Xie Rongna, Fu Anmin.
PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud
[J]. Journal of Computer Research and Development, 2018, 55(7): 1479-1487.
|
[7] |
Hui Zhen, Feng Dengguo, Zhang Min, Hong Cheng.
A Secure Index Against Statistical Analysis Attacks
[J]. Journal of Computer Research and Development, 2017, 54(2): 295-304.
|
[8] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[9] |
Dong Xiaolei, Zhou Jun, Cao Zhenfu.
Research Advances on Secure Searchable Encryption
[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120.
|
[10] |
Wu Libing, Zhang Yubo, He Debiao.
Dual Server Identity-Based Encryption with Equality Test for Cloud Computing
[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243.
|
[11] |
Su Hang, Zhu Zhiqiang, Sun Lei.
Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377.
|
[12] |
Li Zhen, Jiang Han, Zhao Minghao.
A Discretionary Searchable Encryption Scheme in Multi-User Settings
[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322.
|
[13] |
Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie.
CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
[J]. 计算机研究与发展, 2014, 51(7): 1424-1435.
|
[14] |
Guo Lifeng and Lu Bo.
Efficient Proxy Re-encryption with Keyword Search Scheme
[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
|
[15] |
Wang Zhonghua, Han Zhen, Liu Jiqiang.
File Sharing Scheme for Multi-User in Cloud Environment
[J]. Journal of Computer Research and Development, 2014, 51(12): 2614-2622.
|