Fast Multi-dimensional Range Queries on Encrypted Cloud Databases
暂无分享,去创建一个
Min Zhang | Zhenfeng Zhang | Cheng Hong | Jialin Chi | Min Zhang | Zhenfeng Zhang | Cheng Hong | Jialin Chi
[1] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[2] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[3] David,et al. [Wiley Series in Probability and Statistics] Order Statistics (David/Order Statistics) || Basic Distribution Theory , 2003 .
[4] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[5] Yantian Hou,et al. Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index , 2014, AsiaCCS.
[6] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[7] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[8] Peng Wang,et al. Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[9] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[10] Gu Jixing,et al. Known‐plaintext attack on secure kNN computation on encrypted databases , 2014 .
[11] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[12] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.
[13] Rui Li,et al. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing , 2014, Proc. VLDB Endow..
[14] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Haitao Wang,et al. Geometric Range Search on Encrypted Spatial Data , 2016, IEEE Transactions on Information Forensics and Security.
[16] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[17] H. N. Nagaraja,et al. Order Statistics, Third Edition , 2005, Wiley Series in Probability and Statistics.
[18] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[19] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[20] Min Zhang,et al. Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases , 2015, WISE.
[21] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[22] Christian S. Jensen,et al. Building Accurate 3D Spatial Networks to Enable Next Generation Intelligent Transportation Systems , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[23] Dengguo Feng,et al. Fast Multi-keywords Search over Encrypted Cloud Data , 2016, WISE.