The following publications are possibly variants of this publication:
- An Encryption Scheme with Hidden Keyword Search for Outsourced DatabaseXiaoming Wang, Guoxiang Yao, Zhen Zhang. jnw, 6(12):1697-1704, 2011. [doi]
- Privacy-Preserving Data Mining from Outsourced DatabasesFosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang. In Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes, editors, Computers, Privacy and Data Protection - an Element of Choice. pages 411-426, Springer, 2011. [doi]