Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 153791, 16 pages
http://dx.doi.org/10.1155/2014/153791
Research Article

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China

Received 18 October 2013; Accepted 8 January 2014; Published 25 February 2014

Academic Editors: H.-E. Tseng and G. Wei

Copyright © 2014 Guangchun Luo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Liang Hu, Tengfei Li, Yan Li, Jianfeng Chu, Hongtu Li, and Hongying Han, “The research and outlook for keyword-based searchable encryption in cloud storage,” Journal of Communications, vol. 10, no. 10, pp. 766–772, 2015. View at Publisher · View at Google Scholar
  • Kirk Y Williams, “Insider-Threat Detection in Corporate Espionage and Cyber-Espionage,” National Security and Counterintelligence in the Era of Cyber Espionage, pp. 62–77, 2016. View at Publisher · View at Google Scholar
  • K.Y Williams, Dana-Marie Thomas, and Latoya N. Johnson, “The Value of Personal Information,” National Security and Counterintelligence in the Era of Cyber Espionage, pp. 161–180, 2016. View at Publisher · View at Google Scholar
  • K.Y Williams, Dana-Marie Thomas, and Latoya N. Johnson, “The Value of Personal Information,” Identity Theft: Breakthroughs in Research and Practice, pp. 308–326, 2017. View at Publisher · View at Google Scholar