Secure Similarity Search
暂无分享,去创建一个
[1] Dong Hoon Lee,et al. Secure Similarity Search , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).
[2] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[3] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[4] Horst Bunke,et al. On Median Graphs: Properties, Algorithms, and Applications , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Dawn Song,et al. Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗ , 2006 .
[6] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[7] Dong Hoon Lee,et al. Secure Index Search for Groups , 2005, TrustBus.
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Christian Grothoff,et al. Efficient Sharing of Encrypted Data , 2002, ACISP.
[10] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[11] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[12] Lawrence B. Holder,et al. Structural Pattern Recognition in Graphs , 2003 .
[13] Ricardo A. Baeza-Yates,et al. Matchsimile: a Flexible Approximate Matching Tool for Searching Proper Name , 2003, J. Assoc. Inf. Sci. Technol..
[14] Stanley B. Zdonik,et al. Fast, Secure Encryption for Indexing in a Column-Oriented DBMS , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[15] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[16] Mikhail J. Atallah,et al. Secure Biometric Authentication for Weak Computational Devices , 2005, Financial Cryptography.
[17] Atsuhiro Takasu. An approximate multi-word matching algorithm for robust document retrieval , 2006, CIKM '06.
[18] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[19] Radu Sion,et al. Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy , 2005, IACR Cryptol. ePrint Arch..
[20] Tanja Lange,et al. Searchable encryption revisited , 2006, CRYPTO 2006.
[21] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[22] Gonzalo Navarro,et al. A guided tour to approximate string matching , 2001, CSUR.
[23] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[24] Gonzalo Navarro,et al. Faster Approximate String Matching , 1999, Algorithmica.
[25] Hakan Hacigümüs,et al. Query Optimization in Encrypted Database Systems , 2005, DASFAA.
[26] Dong Hoon Lee,et al. Efficient Conjunctive Keyword Search on Encrypted Data Storage System , 2006, EuroPKI.
[27] Ricardo A. Baeza-Yates,et al. Text-Retrieval: Theory and Practice , 1992, IFIP Congress.
[28] A. Rizzi,et al. Automatic Image Classification by a Granular Computing Approach , 2006, 2006 16th IEEE Signal Processing Society Workshop on Machine Learning for Signal Processing.
[29] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[30] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[31] George Karypis,et al. Frequent Substructure-Based Approaches for Classifying Chemical Compounds , 2005, IEEE Trans. Knowl. Data Eng..
[32] Graham Cormode,et al. The string edit distance matching problem with moves , 2002, SODA '02.
[33] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.
[34] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[35] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.