[1] |
Lu Bingjie, Zhou Jun, Cao Zhenfu.
A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
[J]. Journal of Computer Research and Development, 2020, 57(10): 2104-2116.
|
[2] |
Yang Ningbin, Zhou Quan, Xu Shumei.
Public-Key Authenticated Encryption with Keyword Search Without Pairings
[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135.
|
[3] |
Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng.
Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206.
|
[4] |
Xu Qian, Tan Chengxiang, Fan Zhijie, Feng Jun, Zhu Wenye,Xiao Ya.
An Efficient Searchable Encryption Scheme with Designed Tester and Revocable Proxy Re-Encryption
[J]. Journal of Computer Research and Development, 2018, 55(5): 994-1013.
|
[5] |
Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong.
Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
[J]. Journal of Computer Research and Development, 2017, 54(7): 1549-1556.
|
[6] |
Hui Zhen, Feng Dengguo, Zhang Min, Hong Cheng.
A Secure Index Against Statistical Analysis Attacks
[J]. Journal of Computer Research and Development, 2017, 54(2): 295-304.
|
[7] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[8] |
Dong Xiaolei, Zhou Jun, Cao Zhenfu.
Research Advances on Secure Searchable Encryption
[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120.
|
[9] |
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi.
Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204.
|
[10] |
Wu Libing, Zhang Yubo, He Debiao.
Dual Server Identity-Based Encryption with Equality Test for Cloud Computing
[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243.
|
[11] |
Su Hang, Zhu Zhiqiang, Sun Lei.
Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377.
|
[12] |
Chen MingYuan Shaoliang.
Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model
[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892.
|
[13] |
Chen Dongdong, Cao Zhenfu, Dong Xiaolei.
Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption
[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375.
|
[14] |
Han Jun, Fan Ju, Zhou Lizhu.
Semantic-Enhanced Spatial Keyword Search
[J]. Journal of Computer Research and Development, 2015, 52(9): 1954-1964.
|
[15] |
Li Zhen, Jiang Han, Zhao Minghao.
A Discretionary Searchable Encryption Scheme in Multi-User Settings
[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322.
|