[1] |
张应辉, 郑东, 马华. 具有隐私保护的云存储访问控制方案[J]. 电子科技, 2015,28(6):61-63.
|
|
Zhang Yinghui, Zheng Dong, Ma Hua. Privacy-aware access control scheme for cloud storage[J]. Electronic Science and Technology, 2015,28(6):61-63.
|
[2] |
黄海平, 杜建澎, 戴华 , 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017,39(2):389-396.
|
|
Huang Haiping, Du Jianpeng, Dai Hua , et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J]. Journal of Electronics & Information Technology, 2017,39(2):389-396.
|
[3] |
张成, 褚莹, 凌力. 一种基于动态索引表的对称可搜索加密方案[J]. 微型电脑应用, 2017,33(11):39-41.
|
|
Zhang Cheng, Chu Ying, Ling Li. A searchable symmetric encryption scheme based on dynamic index[J]. Microcomputer Applications, 2017,33(11):39-41.
|
[4] |
张楠, 陈兰香. 一种高效的支持排序的关键词可搜索加密系统研究[J]. 信息网络安全, 2017(2):43-50.
|
|
Zhang Nan, Chen Lanxiang. Research on an efficient ranked keywords searchable encryption system[J]. Net Information Security, 2017(2):43-50.
|
[5] |
徐磊, 许春根, 蔚晓玲. 云存储上高效安全的数据检索方案[J]. 密码学报, 2016,3(4):330-339.
|
|
Xu Lei, Xu Chungen, Yu Xiaoling. Secure and efficient data retrieval scheme using searchable encryption in cloud[J]. Journal of Cryptologic Research, 2016,3(4):330-339.
|
[6] |
沈志荣, 薛巍, 舒继武. 可搜索加密机制研究与进展[J]. 软件学报, 2014,25(4):880-895.
|
|
Shen Zhirong, Xue Wei, Shu Jiwu. Survey on the research and development of searchable encryption schemes[J]. Journal of Software, 2014,25(4):880-895.
|
[7] |
徐鹏, 金海. 可搜索加密的研究进展[J]. 网络与信息安全学报, 2016,2(10):8-16.
|
|
Xu Peng, Jin Hai. Research on the searchable encryption[J]. Chinese Journal of Network and Information Security, 2016,2(10):8-16.
|
[8] |
董晓蕾, 周俊, 曹珍富. 可搜索加密研究进展[J]. 计算机研究与发展, 2017,54(10):2107-2120.
|
|
Dong Xiaolei, Zhou Jun, Cao Zhenfu. Research advances on secure searchable encryption[J]. Journal of Computer Research and Development, 2017,54(10):2107-2120.
|
[9] |
秦志光, 徐骏, 聂旭云 , 等. 公钥可搜索加密体制综述[J]. 信息安全学报, 2017,2(3):1-12.
|
|
Qin Zhiguang, Xu Jun, Nie Xuyun , et al. A survey of public-key encryption with keyword search[J]. Journal of Cyber Security, 2017,2(3):1-12.
|
[10] |
袁科, 刘哲理, 贾春福 , 等. 一种多场景下的公钥时控可搜索加密[J]. 电子学报, 2015,43(4):760-768.
|
|
Yuan Ke, Liu Zheli, Jia Chunfu , et al. Public key timed-release searchable encryption in one-to-many scenarios[J]. Acta Electronica Sinica, 2015,43(4):760-768.
|
[11] |
Wang H, Zhou L, Zhang W, et al. Watermarking-based perceptual hashing search over encrypted speech[C]. Auckland:The Twelfth International Workshop on Digital-Forensics and Watermarking, 2013.
|
[12] |
Hao G Y, Wang H X. Perceptual speech hashing algorithm based on time and frequency domain change characteristics[C]. Chengdu:Symposium on Information, Electronics, and Control Technologies, 2015.
|
[13] |
Zhao H, He S F. A retrieval algorithm for encrypted speech based on perceptual Hashing[C]. Changsha:The Twelfth International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, 2016.
|
[14] |
He S F, Zhao H . A retrieval algorithm of encrypted speech based on syllable-level perceptual Hashing[J]. Computer Science & Information Systems, 2017,14(3):703-718.
|
[15] |
李经纬, 贾春福, 刘哲理 , 等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1):109-128.
|
|
Li Jingwei, Jia Chunfu, Liu Zheli , et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1):109-128.
|
[16] |
Zhao H, He S F, Chen Z , et al. Dual key speech encryption algorithm based underdetermined BSS[J]. The Scientific World Journal, 2014(1):57-78.
|