Page 108 - Read Online
P. 108

Salmani et al. J Surveill Secur Saf 2020;1:79–101  I http://dx.doi.org/10.20517/jsss.2020.16  Page 101



                  2007 August 19–23; Santa Barbara,USA; Berlin: Springer, 2007. pp. 535–52
               30. Attrapadung N, Libert B. Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for
                  negation. In: International Workshop on Public Key Cryptography; 2010 May 26–28; Paris, France; Berlin: Springer, 2010. pp. 384–402.
               31. Boldyreva A, Chenette N, Lee Y, O’neill A. Order-preserving sym-metric encryption. In: Annual International Conference on the Theory
                  and Applications of Crypto-graphic Techniques, 2009 April 26–30; Cologne, Germany; Berlin: Springer, 2009. pp. 224–41.
               32. Ocansey SK, Wang C. Search over encrypted cloud data with secure updates. In: 2019 IEEE 19th International Conference on Software
                  Quality, Reliability and Security Companion (QRS-C), 2019July 22–26; Sofia, Bulgaria; New York: IEEE, 2019. pp. 380–86.
   103   104   105   106   107   108   109   110   111   112   113