Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,†Proc. IEEE INFOCOM, pp. 829- 837, Apr, 2011. [2] L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M.Lindner, “A Break in the Clouds: Towards a Cloud Definition,†ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2009. [3] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, “LT Codes-Based Secure and Reliable Cloud Storage Service,†Proc. IEEE INFOCOM, pp. 693- 701, 2012. [4] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†Proc. 14th Int’l Conf. Financial Cryptograpy and Data Security, Jan. 2010. [5] A. Singhal, “Modern Information Retrieval: A Brief Overview,†IEEE Data Eng. Bull., vol. 24, no. 4, pp. 35- 43, Mar. 2001. [6] I.H. Witten, A. Moffat, and T.C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann Publishing, May 1999. [7] D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,†Proc. IEEE Symp. Security and Privacy, 2000. [8] E.-J. Goh, “Secure Indexes,†Cryptology ePrint Archive, http:// eprint.iacr.org/2003/216. 2003. [9] Y.-C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,†Proc. Third Int’l Conf. Applied Cryptography and Network Security, 2005. [10] R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,†Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), 2006. [11] D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,†Proc. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004. [12] M. Bellare, A. Boldyreva, and A. ONeill, “Deterministic and Efficiently Searchable Encryption,†Proc. 27th Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO ’07), 2007. [13] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable Encryption Revisited: Consistency Properties, sRelation to Anonymous Ibe, and Extensions,†J. Cryptology, vol. 21, no. 3, pp. 350-391, 2008.
V2I1257.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|