Login / Signup
Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.
Manuel Koschuch
Michael Hombauer
Sigrid Schefer-Wenzl
Ulrich Haböck
Stefan Hrdlicka
Published in:
IM (2015)
Keyphrases
</>
encryption scheme
cloud computing
standard model
proxy re encryption
public key
ciphertext
secret sharing scheme
public key encryption
digital libraries
homomorphic encryption
cca secure