Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario
暂无分享,去创建一个
Zongda Wu | Zhuolin Mei | Xianyi Chen | Caicai Zhang | Bin Wu | Zhiqiang Zhao | Zongda Wu | Xianyi Chen | Bin Wu | Zhiqiang Zhao | Zhuolin Mei | Caicai Zhang
[1] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[3] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[4] Arunita Jaekel,et al. Optimal path planning strategies for monitoring coverage holes in Wireless Sensor Networks , 2020, Ad Hoc Networks.
[5] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[6] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[7] Hua Wang,et al. Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[8] Muttukrishnan Rajarajan,et al. A parallelized disjunctive query based searchable encryption scheme for big data , 2020, Future Gener. Comput. Syst..
[9] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[10] Brajendra Singh Rajput,et al. A survey of Stemming Algorithms for Information Retrieval , 2015 .
[11] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[12] Jianliang Xu,et al. Asymmetric structure-preserving subgraph queries for large graphs , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[13] Leilei Du,et al. Dynamic multi-client searchable symmetric encryption with support for boolean queries , 2020, Inf. Sci..
[14] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[16] Xingming Sun,et al. Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search , 2020, ACM Trans. Multim. Comput. Commun. Appl..
[17] Qian Wang,et al. Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.
[18] Xiaofang Zhou,et al. Fast Query Decomposition for Batch Shortest Path Processing in Road Networks , 2020, 2020 IEEE 36th International Conference on Data Engineering (ICDE).
[19] Artem A. Sedakov,et al. Coordinated Influence on the Opinions of Social Network Members , 2020, Autom. Remote. Control..
[20] Yong Xiang,et al. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data , 2020, IEEE Transactions on Cloud Computing.
[21] Shunli Zhang,et al. A Novel Range Search Scheme Based on Frequent Computing for Edge-Cloud Collaborative Computing in CPSS , 2020, IEEE Access.
[22] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[23] Jim Duggan,et al. Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing , 2020, Future Gener. Comput. Syst..
[24] Yun Q. Shi,et al. Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform , 2015, IEEE Signal Processing Letters.
[25] Zongda Wu,et al. An efficient subscription index for publication matching in the cloud , 2016, Knowl. Based Syst..
[26] Guoping Jiang,et al. Bessel-Fourier moment-based robust image zero-watermarking , 2013, Multimedia Tools and Applications.
[27] Cong Wang,et al. Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[28] Pascal Lafourcade,et al. GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation , 2020, DBSec.
[29] Huaqun Wang,et al. Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain , 2020, IEEE Transactions on Dependable and Secure Computing.
[30] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[31] Catherine D. Schuman,et al. Neuromorphic Graph Algorithms: Extracting Longest Shortest Paths and Minimum Spanning Trees , 2020, NICE.
[32] Yiming Yang,et al. Introducing the Enron Corpus , 2004, CEAS.
[33] C. Rama Krishna,et al. Searchable encryption: A survey on privacy‐preserving search schemes on encrypted outsourced data , 2019, Concurr. Comput. Pract. Exp..
[34] S. Rajsbaum. Foundations of Cryptography , 2014 .
[35] Yan Xiao,et al. Digital Watermark-Based Independent Individual Certification Scheme in WSNs , 2019, IEEE Access.
[36] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[37] Pan Li,et al. Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data , 2019, IEEE Transactions on Big Data.
[38] Pengfei Zhou,et al. Think Like A Graph: Real-Time Traffic Estimation at City-Scale , 2019, IEEE Transactions on Mobile Computing.
[39] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[40] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[41] Zongmin Cui,et al. Blind Reversible Authentication Based on PEE and CS Reconstruction , 2018, IEEE Signal Processing Letters.
[42] Sven de Vries,et al. Computing cyclic invariants for molecular graphs , 2017, Networks.