Page 108 - Read Online
P. 108
Salmani et al. J Surveill Secur Saf 2020;1:79–101 I http://dx.doi.org/10.20517/jsss.2020.16 Page 101
2007 August 19–23; Santa Barbara,USA; Berlin: Springer, 2007. pp. 535–52
30. Attrapadung N, Libert B. Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for
negation. In: International Workshop on Public Key Cryptography; 2010 May 26–28; Paris, France; Berlin: Springer, 2010. pp. 384–402.
31. Boldyreva A, Chenette N, Lee Y, O’neill A. Order-preserving sym-metric encryption. In: Annual International Conference on the Theory
and Applications of Crypto-graphic Techniques, 2009 April 26–30; Cologne, Germany; Berlin: Springer, 2009. pp. 224–41.
32. Ocansey SK, Wang C. Search over encrypted cloud data with secure updates. In: 2019 IEEE 19th International Conference on Software
Quality, Reliability and Security Companion (QRS-C), 2019July 22–26; Sofia, Bulgaria; New York: IEEE, 2019. pp. 380–86.