Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
33
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,009
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
other
Author(s):
Yubo Zheng
,
Peng Xu
,
Wei Wang
,
Tianyang Chen
,
Willy Susilo
,
Kaitai Liang
,
Hai Jin
Publication date
(Online):
September 22 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
33
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Encryption with Keyword Search
Dan Boneh
,
Giovanni Di Crescenzo
,
Rafail Ostrovsky
…
(2004)
0
comments
Cited
61
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Pairing-Friendly Elliptic Curves of Prime Order
Paulo Barreto
,
Michael Naehrig
(2006)
0
comments
Cited
53
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Proofs of Work and Bread Pudding Protocols(Extended Abstract)
Markus Jakobsson
,
Ari Juels
(1999)
0
comments
Cited
39
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
September 22 2022
Pages
: 86-104
DOI:
10.1007/978-3-031-17146-8_5
SO-VID:
209a8ff9-2681-4049-a163-05e3362d52d2
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. C1
Correction to: Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 3
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
pp. 24
Utility-Preserving Biometric Information Anonymization
pp. 42
Anonymous Traceback for End-to-End Encryption
pp. 65
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
pp. 86
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
pp. 105
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
pp. 126
Verifying the Quality of Outsourced Training on Clouds
pp. 145
SecQuant: Quantifying Container System Call Exposure
pp. 167
Robust and Scalable Process Isolation Against Spectre in the Cloud
pp. 189
Administration of Machine Learning Based Access Control
pp. 211
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
pp. 233
A Tale of Four Gates
pp. 255
Sequential Digital Signatures for Cryptographic Software-Update Authentication
pp. 275
On Committing Authenticated-Encryption
pp. 295
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
pp. 317
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
pp. 337
Fuzzy Authenticated Key Exchange with Tight Security
pp. 361
Continuous Authentication in Secure Messaging
pp. 385
Half-Aggregation of Schnorr Signatures with Tight Reductions
pp. 405
Ring Signatures with User-Controlled Linkability
pp. 427
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
pp. 447
Efficient Unique Ring Signatures from Lattices
pp. 467
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
pp. 487
Deterministic Wallets for Adaptor Signatures
pp. 507
Puncturable Signature: A Generic Construction and Instantiations
pp. 531
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
pp. 549
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
pp. 569
IoTEnsemble: Detection of Botnet Attacks on Internet of Things
pp. 589
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
pp. 610
No-Label User-Level Membership Inference for ASR Model Auditing
pp. 631
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
pp. 653
How to Verifiably Encrypt Many Bits for an Election?
pp. 672
A Framework for Constructing Single Secret Leader Election from MPC
pp. 692
AppBastion: Protection from Untrusted Apps and OSes on ARM
pp. 716
Collaborative Anomaly Detection System for Charging Stations
Similar content
3,009
DEK over-expression promotes mitotic defects and micronucleus formation
Authors:
MC Matrka
,
RF Hennigan
,
F. Kappes
…
DEK oncogene expression during normal hematopoiesis and in Acute Myeloid Leukemia (AML)
Authors:
Gemma E. Logan
,
Nirit Mor-Vaknin
,
Till Braunschweig
…
An approach to the metabolic degradation of diethylketone (DEK) by Streptococcus equisimilis: Effect of DEK on the growth, biodegradation kinetics and efficiency
Authors:
Filomena Costa
,
Cristina Quintelas
,
Teresa Tavares
See all similar