| Document Date: 2012-11-06 05:29:20 Open Document File Size: 354,91 KBShare Result on Facebook
City Hierarchical / / Company Assume Bob / SIAM Journal / G1 / Gemalto Security Labs / / / IndustryTerm revertible composition law / probabilistic algorithm / nd applications / telephone operator / secure management / probabilistic algorithms / well-identified bank accounts / telephone statement / revertible operator / computing / e-hellman / keyword search / / Organization US Federal Reserve / U.S. Securities and Exchange Commission / swiss army / / Person Alice / / Position Prime Minister / telephone operator / wb / police inspector / / Product Franklin / / PublishedMedium SIAM Journal on Computing / IEEE Transactions on Information Theory / Cryptology ePrint Archive / / Technology Encryption / decryptable searchable encryption / Cryptography / searchable encryption / public key / public-key encryption / PKI / 231 underlying searchable encryption / Identity-based encryption / private key / chosen-ciphertext secure encryption / secret key / trapdoor mechanism Decryptable Searchable Encryption / ID-based encryption / factoring-based encryption / ElGamal encryption / ID-based decryptable searchable encryption / 2007 Decryptable Searchable Encryption / keywords i.e. encryption / probabilistic algorithm / Public key encryption / / URL http /
SocialTag |