Index Building / Beijing Institute of Technology / University of Technology / /
IndustryTerm
online table / generation algorithm / search pattern / cloud computing techniques / scheme supporting multi-keyword boolean search / oblivious ram protocol / local indexes using algorithm / search queires / Fuzzy keyword search / secure key distribution protocols / keyword search queries / search tokens / stable search time / dictionary search / keyword search / parallel search time / search token τw / search performance / Software protection / query protocol / issue search tokens using algorithm / search result distribution / setup protocol / cloud computing scenarios / cloud computing applications / Parallel search / search token / decryption algorithms / search time cost / search word / large scale data outsourcing applications / search queries / indexes using algorithm / computing / elastic storage services / cloud computing / correct search tokens / e-health / real-world systems / search time / search results / considered fuzzy keyword search queries / search ability / search time complexity / /
OperatingSystem
Microsoft Windows / /
Organization
Beijing Institute of Technology / Beijing / Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application / University of Technology / Sydney / School of Computer Science and Technology / /
Person
J. Li / C. Wang / K. Ren / Ai / N. Cao / Q. Wang / Jin Li / W. Lou / / /
Position
Cao / /
Product
ipad / /
PublishedMedium
Cryptology ePrint Archive / /
Technology
local indexes using algorithm / BuildIndex algorithm / Parallel and dynamic searchable symmetric encryption / RAM / DU issue search tokens using algorithm / indexes using algorithm / secure key distribution protocols / Information Technology / symmetric-key encryption / Dynamic searchable encryption / 1 Algorithm / oblivious ram protocol / two protocols / secret key / Random Access / decryption algorithms / Encryption / Bit string encryption / query protocol / cellular telephone / Cryptography / Update algorithm / key generation algorithm / Searchable Symmetric Encryption / setup protocol / Query protocols / MergeIndex algorithm / simulation / dynamic searchable symmetric encryption / five algorithms / /