Skip to main navigation
Skip to search
Skip to main content
University of Twente Research Information Home
Home
Profiles
Research units
Projects
Research output
Datasets
Activities
Prizes
Press/Media
Search by expertise, name or affiliation
Cryptographically Enforced Search Pattern Hiding
C.T. Bösch
Databases (Former)
Research output
:
Thesis
›
PhD Thesis - Research UT, graduation UT
1299
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Cryptographically Enforced Search Pattern Hiding'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Pattern Search
100%
Server
57%
Encrypted Data
42%
Encryption
42%
Database Record
28%
Searchable Encryption Scheme
28%
Keywords
28%
Database Entry
28%
Application Scenario
28%
Encrypted Database
14%
Attack
14%
Storage Provider
14%
Building-Blocks
14%
encryption key
14%
Survey
14%
Process Approach
14%
Public Key Encryption
14%
Keyword Search
14%
provably secure
14%
Attackers
14%
Random Function
14%
Plaintext
14%
Symmetric Encryption
14%
Statistical Analysis
14%
Database Server
14%
Homomorphic Encryption
14%
Shuffle
14%
Practical Application
14%
Real World
14%
Cryptographic Primitive
14%