An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
暂无分享,去创建一个
Zhihua Xia | Xingming Sun | Li Chen | Qi Liu | Xingming Sun | Zhihua Xia | Qi Liu | Li Chen | Jin Wang | Xingming Sun
[1] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[2] Weiming Zhang,et al. A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data , 2012, 2012 International Conference on Cloud and Service Computing.
[3] David M. W. Powers,et al. The Problem with Kappa , 2012, EACL.
[4] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[5] M. Chuah,et al. Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, International Conference on Distributed Computing Systems Workshops.
[6] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[8] M. Zaharia,et al. A view of cloud computing , 2010, CACM.
[9] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[10] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[11] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[12] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[13] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[14] T. Landauer,et al. Latent semantic analysis , 2008, Scholarpedia.
[15] K. Ren,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[17] Bharat K. Bhargava,et al. International journal of security and its applications , 2013 .
[18] Rico Sennrich,et al. Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics , 2012 .
[19] David L. Olson,et al. Advanced Data Mining Techniques , 2008 .
[20] Susan T. Dumais,et al. Latent Semantic Indexing (LSI) and TREC-2 , 1993, TREC.