[1] |
SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// 2000 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2000:44-55.
|
[2] |
GOH E J. Secure Indexes[EB/OL]. [2021-02-20]. https://www.researchgate.net/publication/2889193_Secure_Indexes.
|
[3] |
LIU X, YANG G, MU Y, et al. Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018(99):1.
|
[4] |
DAI H, DAI X, YI X, et al. Semantic-Aware Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data[J]. Journal of Network and Computer Applications, 2019, 147:102442.
doi: 10.1016/j.jnca.2019.102442
|
[5] |
FU S, ZHANG Q, JIA N, et al. A Privacy-Preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data[J/OL]. [2021-03-01].DOI: 10.1007/s11036-019-01493-3.
doi: 10.1007/s11036-019-01493-3
|
[6] |
GAGAN, KRISHNAC R,HANDA R. Dynamic Cluster based Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data[C/OL]. [2021-03-05].DOI: 10.1109/CONFLUENCE.2016.7508104.
doi: 10.1109/CONFLUENCE.2016.7508104
|
[7] |
ZHU X, CHEN C, TIAN X, et al. HCSF:A Hierarchical Clustering Algorithm based on Swarm Intelligence and Fuzzy Logic for Ciphertext Search[C/OL]. [2021-03-06]. DOI: 10.1109/ICIEA.2015.7334127.
doi: 10.1109/ICIEA.2015.7334127
|
[8] |
MANASRAH A M, NASIR M A, SALEM M. A Privacy-Preserving Multi-Keyword Search Approach in Cloud Computing[J]. Soft Computing, 2020, 24(8):5609-5631.
doi: 10.1007/s00500-019-04033-z
|
[9] |
闫玺玺, 刘媛, 李子臣, 等. 策略半隐藏且支持更新的多机构属性加密方案[J]. 西安电子科技大学学报, 2018, 45(2):122-128.
|
|
YAN Xixi, LIU Yuan, LI Zichen, et al. Multi-Authority Attribute-Based Encryption Scheme with Policy Semi-Hidden and Dynamic Updating[J]. Journal of Xidian University, 2018, 45(2):122-128.
|
[10] |
于金霞, 何旭, 闫玺玺. 机构可验证的密文策略属性基加密方案[J]. 西安电子科技大学学报, 2019, 46(4):49-57.
|
|
YU Jinxia, HE Xu, YAN Xixi. Ciphertext-Policy Attribute-Based Encryption Scheme with Verifiability on Authority[J]. Journal of Xidian University, 2019, 46(4):49-57.
|
[11] |
王荣荣. 基于属性的可搜索加密方案研究与实现[D]. 西安: 西安电子科技大学, 2018.
|
[12] |
DU L, LI K, LIU Q, et al. Dynamic Multi-Client Searchable Symmetric Encryption with Support for Boolean Queries[J]. Information Sciences, 2020, 506:234-257.
doi: 10.1016/j.ins.2019.08.014
|
[13] |
KIAYIAS A, OKSUZ O, RUSSELL A, et al. Efficient Encrypted Keyword Search for Multi-User Data Sharing[C]// European Symposium on Research in Computer Security.Heidelberg:Springer, 2016:173-195
|
[14] |
PASUPULETI S K, RAMALINGAM S, BUYYA R. An Efficient and Secure Privacy-Preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing[J/OL]. [2021-03-10].DOI: 10.1016/j.jnca.2015.11.023.
doi: 10.1016/j.jnca.2015.11.023
|
[15] |
崔海涛, 李玲娟. 基于Jaccard和LPA的社团划分算法[J]. 南京邮电大学学报:自然科学版, 2019, 39(6):79-85.
|
|
CUI Haitao, LI Lingjuan. Community Division Algorithm Based on Jaccard Similarity Algorithm and LPA[J]. Journal of Nanjing University of Posts and Telecommunication:Natural Sicence Edition, 2019, 39(6):79-85.
|
[16] |
ZHU X, DAI H, YI X, et al. MUSE:An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data[J]. Security & Communication Networks, 2017, 2017:1-17.
|