Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top- $k$ Spatial–Textual Query
暂无分享,去创建一个
Rongxing Lu | Suprio Ray | Divya Negi | Rongxing Lu | S. Ray | Divya Negi
[1] Jon Louis Bentley,et al. Quad trees a data structure for retrieval on composite keys , 1974, Acta Informatica.
[2] Jianliang Xu,et al. Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[3] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[4] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[5] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[6] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[7] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[8] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[9] P. Santhi Thilagam,et al. Approaches and challenges of privacy preserving search over encrypted data , 2019, Information Systems.
[10] W. Bruce Croft,et al. A language modeling approach to information retrieval , 1998, SIGIR '98.
[11] Christian S. Jensen,et al. Spatial Keyword Query Processing: An Experimental Evaluation , 2013, Proc. VLDB Endow..
[12] Anthony K. H. Tung,et al. Scalable top-k spatial keyword search , 2013, EDBT '13.
[13] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[14] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[15] João B. Rocha-Junior,et al. Efficient Processing of Top-k Spatial Keyword Queries , 2011, SSTD.
[16] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[17] Tetsuji Satoh,et al. Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[18] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[19] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[20] Xiang Cheng,et al. Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments , 2018, IEEE Transactions on Services Computing.
[21] Christian S. Jensen,et al. Efficient Retrieval of the Top-k Most Relevant Spatial Web Objects , 2009, Proc. VLDB Endow..
[22] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[23] Marco Gruteser,et al. USENIX Association , 1992 .
[24] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .