Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. Xu, P., Jin, H., Wu, Q., & Wang, W. IEEE Trans. Computers (TC), 62(11):2266-2277, 2013.
Paper bibtex @article{ dblp2184276,
title = {Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack},
author = {Peng Xu and Hai Jin and Qianhong Wu and Wei Wang},
author_short = {Xu, P. and Jin, H. and Wu, Q. and Wang, W.},
bibtype = {article},
type = {article},
year = {2013},
key = {dblp2184276},
id = {dblp2184276},
biburl = {http://www.dblp.org/rec/bibtex/journals/tc/XuJWW13},
url = {http://doi.ieeecomputersociety.org/10.1109/TC.2012.215},
journal = {IEEE Trans. Computers (TC)},
pages = {2266-2277},
number = {11},
volume = {62},
text = {IEEE Trans. Computers (TC) 62(11):2266-2277 (2013)}
}
Downloads: 0
{"_id":"tt4Bku4KG7aAdqNCm","bibbaseid":"xu-jin-wu-wang-publickeyencryptionwithfuzzykeywordsearchaprovablysecureschemeunderkeywordguessingattack-2013","downloads":0,"creationDate":"2015-11-19T14:35:37.212Z","title":"Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack","author_short":["Xu, P.","Jin, H.","Wu, Q.","Wang, W."],"year":2013,"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/tc/XuJWW13","bibdata":{"title":"Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack","author":["Peng Xu","Hai Jin","Qianhong Wu","Wei Wang"],"author_short":["Xu, P.","Jin, H.","Wu, Q.","Wang, W."],"bibtype":"article","type":"article","year":"2013","key":"dblp2184276","id":"dblp2184276","biburl":"http://www.dblp.org/rec/bibtex/journals/tc/XuJWW13","url":"http://doi.ieeecomputersociety.org/10.1109/TC.2012.215","journal":"IEEE Trans. Computers (TC)","pages":"2266-2277","number":"11","volume":"62","text":"IEEE Trans. Computers (TC) 62(11):2266-2277 (2013)","bibtex":"@article{ dblp2184276,\n title = {Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack},\n author = {Peng Xu and Hai Jin and Qianhong Wu and Wei Wang},\n author_short = {Xu, P. and Jin, H. and Wu, Q. and Wang, W.},\n bibtype = {article},\n type = {article},\n year = {2013},\n key = {dblp2184276},\n id = {dblp2184276},\n biburl = {http://www.dblp.org/rec/bibtex/journals/tc/XuJWW13},\n url = {http://doi.ieeecomputersociety.org/10.1109/TC.2012.215},\n journal = {IEEE Trans. Computers (TC)},\n pages = {2266-2277},\n number = {11},\n volume = {62},\n text = {IEEE Trans. Computers (TC) 62(11):2266-2277 (2013)}\n}","bibbaseid":"xu-jin-wu-wang-publickeyencryptionwithfuzzykeywordsearchaprovablysecureschemeunderkeywordguessingattack-2013","role":"author","urls":{"Paper":"http://doi.ieeecomputersociety.org/10.1109/TC.2012.215"},"downloads":0},"search_terms":["public","key","encryption","fuzzy","keyword","search","provably","secure","scheme","under","keyword","guessing","attack","xu","jin","wu","wang"],"keywords":[],"authorIDs":["545edbd56aaec20d230009a3"],"dataSources":["3ZcCrKcQByoeuewQ6"]}