Sign in
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
Ke Li
Weiming Zhang
Ce Yang
Nenghai Yu
Published in:
IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
</>
security requirements
security analysis
security properties
smart card
high security
data sets
encryption algorithm
order preserving
data structure
data points
raw data
data distribution
information systems
original data
security protocols