Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network

[1]  Christos D. Zaroliagis,et al.  Multiobjective Optimization: Improved FPTAS for Shortest Paths and Non-Linear Objectives with Applications , 2006, Theory of Computing Systems.

[2]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[3]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[4]  Jinjun Chen,et al.  Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud , 2017, IEEE Transactions on Sustainable Computing.

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Rong Hao,et al.  Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage" , 2019, IEEE Transactions on Services Computing.

[8]  Takuya Akiba,et al.  Fast exact shortest-path distance queries on large networks by pruned landmark labeling , 2013, SIGMOD '13.

[9]  Refael Hassin,et al.  Approximation Schemes for the Restricted Shortest Path Problem , 1992, Math. Oper. Res..

[10]  Xiangjian He,et al.  Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data , 2021, IEEE Transactions on Dependable and Secure Computing.

[11]  Gang Chen,et al.  Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[12]  Mikkel Thorup,et al.  Approximate distance oracles , 2005, J. ACM.

[13]  Cong Wang,et al.  Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[14]  Edith Cohen,et al.  Reachability and distance queries via 2-hop labels , 2002, SODA '02.

[15]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[16]  Sofya Raskhodnikova,et al.  Analyzing Graphs with Node Differential Privacy , 2013, TCC.

[17]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[18]  Ximeng Liu,et al.  PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries , 2020, Inf. Sci..

[19]  Yin Yang,et al.  Effective Indexing for Approximate Constrained Shortest Path Queries on Large Road Networks , 2016, Proc. VLDB Endow..

[20]  Sabine Storandt,et al.  Route Planning for Bicycles - Exact Constrained Shortest Paths Made Practical via Contraction Hierarchy , 2012, ICAPS.

[21]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[23]  Yunjun Gao,et al.  On efficiently diversified top-k geo-social keyword query processing in road networks , 2020, Inf. Sci..

[24]  Jianliang Xu,et al.  Privacy-Preserving Reachability Query Services , 2014, DASFAA.

[25]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[26]  Melissa Chase,et al.  Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..

[27]  Rik Sarkar,et al.  Multi-scale Attributed Node Embedding , 2019, J. Complex Networks.

[28]  Jia Yu,et al.  SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT , 2022, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  Jiaheng Lu,et al.  Efficient Merging and Filtering Algorithms for Approximate String Searches , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[30]  Xiao Yu,et al.  Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query , 2015 .