The security of our data stores is underestimated in current practice, w...
Searchable encryption (SE) is one of the key enablers for building encry...
Network Function Virtualisation (NFV) advances the development of compos...
Outlier detection is widely used in practice to track the anomaly on
inc...
The consensus protocol named proof of work (PoW) is widely applied by
cr...
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic...
In this paper, we propose GraphSE^2, an encrypted graph database for onl...