1 Q. Yan, "Software-defined networking(SDN)and distributed denial of service(DDoS)attacks in cloud computing environments : A survey, some research issues, and challenges" 18 (18): 602-622, 2016
2 H. Rhee, "Secure searchable public key encryption scheme against keyword guessing attacks" 6 (6): 237-243, 2009
3 P. Golle, "Secure conjunctive keyword search over encrypted data" 31-45, 2004
4 F. Chen, "Secure cloud storage meets with secure network coding" 65 (65): 1936-1948, 2016
5 M. Abdalla, "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions" 205-222, 2005
6 K. Liang, "Searchable attribute-based mechanism with efficient data sharing for secure cloud storage" 10 (10): 1981-1992, 2015
7 L. Fang, "Public key encryption with keyword search secure against keyword guessing attacks without random oracle" 238 (238): 221-241, 2013
8 J. Baek, "Public key encryption with keyword search revisited" 1249-1259, 2008
9 D. Boneh, "Public key encryption with keyword search" 506-522, 2004
10 L. Cheung, "Provably secure ciphertext policy ABE" 456-465, 2007
1 Q. Yan, "Software-defined networking(SDN)and distributed denial of service(DDoS)attacks in cloud computing environments : A survey, some research issues, and challenges" 18 (18): 602-622, 2016
2 H. Rhee, "Secure searchable public key encryption scheme against keyword guessing attacks" 6 (6): 237-243, 2009
3 P. Golle, "Secure conjunctive keyword search over encrypted data" 31-45, 2004
4 F. Chen, "Secure cloud storage meets with secure network coding" 65 (65): 1936-1948, 2016
5 M. Abdalla, "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions" 205-222, 2005
6 K. Liang, "Searchable attribute-based mechanism with efficient data sharing for secure cloud storage" 10 (10): 1981-1992, 2015
7 L. Fang, "Public key encryption with keyword search secure against keyword guessing attacks without random oracle" 238 (238): 221-241, 2013
8 J. Baek, "Public key encryption with keyword search revisited" 1249-1259, 2008
9 D. Boneh, "Public key encryption with keyword search" 506-522, 2004
10 L. Cheung, "Provably secure ciphertext policy ABE" 456-465, 2007
11 D. X. Song, "Practical techniques for searches on encrypted data" 44-55, 2000
12 J. Byun, "Off-line keyword guessing attacks on recent keyword search schemes over encrypted data" 75-83, 2006
13 J. Lai, "Expressive search on encrypted data" 243-252, 2013
14 B. Waters, "Efficient identity-based encryption without random oracles" 114-127, 2005
15 Y. Yang, "Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds" 11 (11): 746-759, 2016
16 J. Bethencourt, "Ciphertext-policy attribute-based encryption" 321-334, 2007
17 B. Zhang, "An efficient public key encryption with conjunctive-subset keywords search" 34 (34): 262-267, 2011
18 K. Emura, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length" 2 (2): 46-59, 2010