Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data (English)
- New search for: Wang, B.
- New search for: Fan, X.
- New search for: Wang, B.
- New search for: Fan, X.
In:
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
;
15
, 6
;
1027-1040
;
2018
-
ISSN:
- Article (Journal) / Print
-
Title:Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
-
Contributors:
-
Published in:IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING ; 15, 6 ; 1027-1040
-
Publisher:
- New search for: IEEE
-
Publication date:2018-01-01
-
Size:14 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 15, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 913
-
Guest Editors’ Introduction: Special Issue on Data-Driven Dependability and SecurityCotroneo, Domenico / Pattabiraman, Karthik / Pecchia, Antonio et al. | 2018
- 915
-
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue WatersJha, Saurabh / Formicola, Valerio / Martino, Catello Di / Dalton, Mark / Kramer, William T. / Kalbarczyk, Zbigniew / Iyer, Ravishankar K. et al. | 2018
- 931
-
Towards Automated Log Parsing for Large-Scale Log Data AnalysisHe, Pinjia / Zhu, Jieming / He, Shilin / Li, Jian / Lyu, Michael R. et al. | 2018
- 945
-
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux CodeSchwahn, Oliver / Winter, Stefan / Coppik, Nicolas / Suri, Neeraj et al. | 2018
- 959
-
Scale Inside-Out: Rapid Mitigation of Cloud DDoS AttacksSomani, Gaurav / Gaur, Manoj Singh / Sanghi, Dheeraj / Conti, Mauro / Rajarajan, Muttukrishnan et al. | 2018
- 974
-
A System Architecture for the Detection of Insider Attacks in Big Data SystemsAditham, Santosh / Ranganathan, Nagarajan et al. | 2018
- 988
-
Learning from the Ones that Got Away: Detecting New Forms of Phishing AttacksGutierrez, Christopher N. / Kim, Taegyu / Corte, Raffaele Della / Avery, Jeffrey / Goldwasser, Dan / Cinque, Marcello / Bagchi, Saurabh et al. | 2018
- 1002
-
Can the Common Vulnerability Scoring System be Trusted? A Bayesian AnalysisJohnson, Pontus / Lagerstrom, Robert / Ekstedt, Mathias / Franke, Ulrik et al. | 2018
- 1016
-
Malware Propagations in Wireless Ad Hoc NetworksLiu, Bo / Zhou, Wanlei / Gao, Longxiang / Zhou, Haibo / Luan, Tom H. / Wen, Sheng et al. | 2018
- 1027
-
Search Ranges Efficiently and Compatibly as Keywords over Encrypted DataWang, Boyang / Fan, Xinxin et al. | 2018
- 1041
-
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of ThingsKim, Jun Young / Hu, Wen / Shafagh, Hossein / Jha, Sanjay et al. | 2018
- 1055
-
Separable Reversible Data Hiding in Encrypted JPEG BitstreamsQian, Zhenxing / Zhou, Hang / Zhang, Xinpeng / Zhang, Weiming et al. | 2018
- 1068
-
The Rise of Social Botnets: Attacks and CountermeasuresZhang, Jinxue / Zhang, Rui / Zhang, Yanchao / Yan, Guanhua et al. | 2018
- 1083
-
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud DataWan, Zhiguo / Deng, Robert H. et al. | 2018