Efficient privacy-preserving circular range search on outsourced spatial data
暂无分享,去创建一个
[1] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[2] Ming Li,et al. Circular range search on encrypted spatial data , 2015, CNS.
[3] Mohammad Ahmadian,et al. A security scheme for geographic information databases in location based systems , 2015, SoutheastCon 2015.
[4] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[5] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Hans-Peter Kriegel,et al. The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.
[7] Xuemin Shen,et al. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.
[8] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[9] Timos K. Sellis,et al. A model for the prediction of R-tree performance , 1996, PODS.
[10] Rong Yu,et al. Cooperative Resource Management in Cloud-Enabled Vehicular Networks , 2015, IEEE Transactions on Industrial Electronics.
[11] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[12] Yantian Hou,et al. Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index , 2014, AsiaCCS.
[13] Peng Wang,et al. Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[14] Andrew Chi-Chih Yao,et al. A general approach to d-dimensional geometric queries , 1985, STOC '85.
[15] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[16] Kaoru Ota,et al. Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS , 2015, IEEE Transactions on Computational Social Systems.
[17] A. Nourollah,et al. A New Algorithm for Shape Reconstruction by the Computational Geometry Approach , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[18] Ran Canetti,et al. Modular Order-Preserving Encryption, Revisited , 2015, SIGMOD Conference.
[19] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.