Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing
暂无分享,去创建一个
Jie Wu | Qin Liu | Guojun Wang | Tian Wang | Yu Peng | Jie Wu | Qin Liu | Guojun Wang | Tian Wang | Yu Peng
[1] Rong Hao,et al. Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification , 2019, IEEE Transactions on Dependable and Secure Computing.
[2] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[3] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[4] Guojun Wang,et al. Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search , 2020, IEEE Transactions on Services Computing.
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Jie Wu,et al. The Dynamic Bloom Filters , 2010, IEEE Transactions on Knowledge and Data Engineering.
[7] Florian Kerschbaum,et al. Practical and Secure Substring Search , 2018, SIGMOD Conference.
[8] Nathan Chenette,et al. Efficient Fuzzy Search on Encrypted Data , 2014, FSE.
[9] Tao Peng,et al. Achieving Secure and Effective Search Services in Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[10] Nora Cuppens-Boulahia,et al. Substring search over encrypted data , 2017, J. Comput. Secur..
[11] Ruiying Du,et al. EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data , 2020, IEEE Transactions on Services Computing.
[12] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[13] G. Mohankumar,et al. PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA , 2018 .
[14] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[15] Tao Peng,et al. Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..
[16] Rongxing Lu,et al. Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud , 2022, IEEE Transactions on Services Computing.
[17] Cong Wang,et al. Generalized pattern matching string search on encrypted data in cloud systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[18] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[19] Vivek Kale. A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA , 2020 .
[20] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[21] Liehuang Zhu,et al. Fuzzy keyword search on encrypted cloud storage data with small index , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[22] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[23] Guojun Wang,et al. Enabling Verifiable and Dynamic Ranked Search over Outsourced Data , 2019, IEEE Transactions on Services Computing.
[24] M. Chuah,et al. Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[25] Cong Wang,et al. Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records , 2015, ESORICS.
[26] S. Karthik,et al. FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data , 2020, Soft Comput..
[27] Gonzalo Navarro,et al. A guided tour to approximate string matching , 2001, CSUR.
[28] Yue Sun,et al. Efficient dynamic multi-keyword fuzzy search over encrypted cloud data , 2020, J. Netw. Comput. Appl..
[29] Robert H. Deng,et al. Flexible Wildcard Searchable Encryption System , 2020, IEEE Transactions on Services Computing.
[30] Xingming Sun,et al. Semantic-Aware Searching Over Encrypted Data for Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[31] Qi Zhang,et al. A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data , 2020, Mobile Networks and Applications.
[32] Feifei Li,et al. Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[33] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[34] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[35] Cong Wang,et al. EncSIM: An encrypted similarity search service for distributed high-dimensional datasets , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).
[36] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[37] Ke Gu,et al. Secure Data Query Framework for Cloud and Fog Computing , 2020, IEEE Transactions on Network and Service Management.
[38] Wenjing Lou,et al. Searchable Symmetric Encryption with Forward Search Privacy , 2019, IEEE Transactions on Dependable and Secure Computing.