ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
24
views
33
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,737
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
other
Author(s):
Yubo Zheng
,
Peng Xu
,
Wei Wang
,
Tianyang Chen
,
Willy Susilo
,
Kaitai Liang
,
Hai Jin
Publication date
(Online):
September 22 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
33
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Encryption with Keyword Search
Dan Boneh
,
Giovanni Di Crescenzo
,
Rafail Ostrovsky
…
(2004)
0
comments
Cited
61
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Pairing-Friendly Elliptic Curves of Prime Order
Paulo Barreto
,
Michael Naehrig
(2006)
0
comments
Cited
53
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Proofs of Work and Bread Pudding Protocols(Extended Abstract)
Markus Jakobsson
,
Ari Juels
(1999)
0
comments
Cited
39
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
September 22 2022
Pages
: 86-104
DOI:
10.1007/978-3-031-17146-8_5
SO-VID:
209a8ff9-2681-4049-a163-05e3362d52d2
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. C1
Correction to: Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 3
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
pp. 24
Utility-Preserving Biometric Information Anonymization
pp. 42
Anonymous Traceback for End-to-End Encryption
pp. 65
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
pp. 86
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
pp. 105
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
pp. 126
Verifying the Quality of Outsourced Training on Clouds
pp. 145
SecQuant: Quantifying Container System Call Exposure
pp. 167
Robust and Scalable Process Isolation Against Spectre in the Cloud
pp. 189
Administration of Machine Learning Based Access Control
pp. 211
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 233
A Tale of Four Gates
pp. 255
Sequential Digital Signatures for Cryptographic Software-Update Authentication
pp. 275
On Committing Authenticated-Encryption
pp. 295
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
pp. 317
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
pp. 337
Fuzzy Authenticated Key Exchange with Tight Security
pp. 361
Continuous Authentication in Secure Messaging
pp. 385
Half-Aggregation of Schnorr Signatures with Tight Reductions
pp. 405
Ring Signatures with User-Controlled Linkability
pp. 427
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
pp. 447
Efficient Unique Ring Signatures from Lattices
pp. 467
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
pp. 487
Deterministic Wallets for Adaptor Signatures
pp. 507
Puncturable Signature: A Generic Construction and Instantiations
pp. 531
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
pp. 549
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
pp. 569
IoTEnsemble: Detection of Botnet Attacks on Internet of Things
pp. 589
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
pp. 610
No-Label User-Level Membership Inference for ASR Model Auditing
pp. 631
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
pp. 653
How to Verifiably Encrypt Many Bits for an Election?
pp. 672
A Framework for Constructing Single Secret Leader Election from MPC
pp. 692
AppBastion: Protection from Untrusted Apps and OSes on ARM
pp. 716
Collaborative Anomaly Detection System for Charging Stations
Similar content
2,737
An approach to the metabolic degradation of diethylketone (DEK) by Streptococcus equisimilis: Effect of DEK on the growth, biodegradation kinetics and efficiency
Authors:
Filomena Costa
,
Cristina Quintelas
,
Teresa Tavares
Endorsperm Development of Maize Defective Kernel (dek) Mutants. Auxin and Cytokinin Levels
Authors:
H. Lur
,
T. SETTER
,
H.‐S. Lur
…
Versuche zum nachweis von tricyclo[3,3,1,13,7]dek-1-en (adamanten) als zwischenstufe bei der bisdehalogenierung von 1-brom-2-jod-adamantan mit lithium-butylen.
Authors:
Dieter Lenoir
See all similar