Alex Firdaus, 2016
PENCARIAN DATA TERENKRIPSI MENGGUNAKAN SKEMA PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
DAFTAR PUSTAKA
Baek, J., Safavi-Naini, R., Susilo,W. (2008). Public key encryption with keyword search revisited. Computational Science and Its.
Bethencourt, J., Song, D., Waters, B. (2006). New Constructions and Practical Applications for Private Stream Searching. IEEE Computer Society.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public Key Encryption with Keyword Search. Eurocrypt, 506–522.
Brinkman, R., Feng, L., Doumen, J., Hartel, P.H., Jonker, W. (2004). Efficient Tree Search in Encrypted Data. Information Systems Security.
Chen, Y. (2014). SPEKS: Secure server-designation public key encryption with keyword search against keyword guessing attacks. Computer Journal.
Dong, C., Russello, G., Dulay, N. (2011). Shared and searchable encrypted data for untrusted servers. Journal of Computer Security.
Hacigumus, H., Hore, B., Iyer, B., Mehrotra, S.(2007). Search on Encrypted Data.
Secure Data Management in Decentralized Systems.
Menezes, A. J., Oorschot, P. C. Van, & Vanstone, S. a. (1997). Handbook of Applied Cryptography. CRC Press.
Mooduto, H. A., & Albar. (2004). Enkripsi Data Menggunakan Algoritma RC4. Munir, R. (2006). Kriptografi. Bandung: Informatika
Natashia, N., Wicaksono, A. (2011). Penerapan Teknik Kriptografi Stream-Cipher Untuk Pengaman Basis Data. ICT Research Center UNAS.
Pressman, Roger. (2002) Software Engineering: A Practitioner Approach. New York: Mc Graw Hill.
Schneier, B. (1996). Applied cryptography: Protocols, algorithm, and source code in C. John Wiley & Sons.
Ucal, M. (2005). Searching on encrypted data. Department of Electrical and Computer Engineering University of Maryland College Park, MD, 1–18. Wagner, D., Perrig, A. (2000). Practical techniques for searches on encrypted
data. Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000