Cooperative private searching in clouds
暂无分享,去创建一个
Qin Liu | Guojun Wang | Chiu Chiang Tan | Jie Wu | Jie Wu | C. C. Tan | Guojun Wang | Qin Liu
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[4] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[5] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[6] Ian Goldberg,et al. Privacy-Preserving Queries over Relational Databases , 2010, Privacy Enhancing Technologies.
[7] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[8] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[9] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[10] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[12] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[13] Sanjay Ghemawat,et al. MapReduce: a flexible data processing tool , 2010, CACM.
[14] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[15] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[16] Donald E. Knuth,et al. The Art of Computer Programming, Volume I: Fundamental Algorithms, 2nd Edition , 1997 .
[17] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[18] Ben Adida,et al. How to Shuffle in Public , 2007, TCC.
[19] Brent Waters,et al. New constructions and practical applications for private stream searching , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[21] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[22] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[23] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, CRYPTO.
[24] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[25] Feng Bao,et al. Private Searching on MapReduce , 2010, TrustBus.
[26] George Danezis,et al. Space-Efficient Private Search with Applications to Rateless Codes , 2007, Financial Cryptography.
[27] Brent Waters,et al. New Techniques for Private Stream Searching , 2009, TSEC.