S KOM 0905673 Bibliography

DAFTAR PUSTAKA
Baek, J., Safavi-Naini, R., Susilo,W. (2008). Public key encryption with keyword
search revisited. Computational Science and Its.
Bethencourt, J., Song, D., Waters, B. (2006). New Constructions and Practical
Applications for Private Stream Searching. IEEE Computer Society.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public Key
Encryption with Keyword Search. Eurocrypt, 506–522.
Brinkman, R., Feng, L., Doumen, J., Hartel, P.H., Jonker, W. (2004). Efficient
Tree Search in Encrypted Data. Information Systems Security.
Chen, Y. (2014). SPEKS: Secure server-designation public key encryption with
keyword search against keyword guessing attacks. Computer Journal.
Dong, C., Russello, G., Dulay, N. (2011). Shared and searchable encrypted data
for untrusted servers. Journal of Computer Security.
Hacigumus, H., Hore, B., Iyer, B., Mehrotra, S.(2007). Search on Encrypted Data.
Secure Data Management in Decentralized Systems.
Menezes, A. J., Oorschot, P. C. Van, & Vanstone, S. a. (1997). Handbook of
Applied Cryptography. CRC Press.
Mooduto, H. A., & Albar. (2004). Enkripsi Data Menggunakan Algoritma RC4.
Munir, R. (2006). Kriptografi. Bandung: Informatika
Natashia, N., Wicaksono, A. (2011). Penerapan Teknik Kriptografi Stream-Cipher
Untuk Pengaman Basis Data. ICT Research Center UNAS.

Pressman, Roger. (2002) Software Engineering: A Practitioner Approach. New
York: Mc Graw Hill.
Schneier, B. (1996). Applied cryptography: Protocols, algorithm, and source code
in C. John Wiley & Sons.
Ucal, M. (2005). Searching on encrypted data. Department of Electrical and
Computer Engineering University of Maryland College Park, MD, 1–18.
Wagner, D., Perrig, A. (2000). Practical techniques for searches on encrypted
data. Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
Waters, B. R., Balfanz, D., Durfee, G., Smetters, D. K. (2004). Building an
Encrypted and Searchable Audit Log. In The 11th Annual Network and
Distributed System Security Symposium.
Alex Firdaus, 2016
PENCARIAN DATA TERENKRIPSI MENGGUNAKAN SKEMA PUBLIC-KEY ENCRYPTION WITH
KEYWORD SEARCH
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu