Sciweavers

Share
CRYPTO   2007 Advances in Cryptology
Wall of Fame | Most Viewed CRYPTO-2007 Paper
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
11 years 5 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source172
2Download preprint from source162
3Download preprint from source154
4Download preprint from source149
5Download preprint from source145
6Download preprint from source145
7Download preprint from source144
8Download preprint from source143
9Download preprint from source134
10Download preprint from source133
11Download preprint from source133
12Download preprint from source132
13Download preprint from source132
14Download preprint from source130
15Download preprint from source130
16Download preprint from source129
17Download preprint from source123
18Download preprint from source116
19Download preprint from source110
20Download preprint from source109
21Download preprint from source106
22Download preprint from source106
23Download preprint from source106
24Download preprint from source105
25Download preprint from source104
26Download preprint from source102
27Download preprint from source99
28Download preprint from source95
29Download preprint from source93
30Download preprint from source88
31Download preprint from source86
books