Secure Range Search Over Encrypted Uncertain IoT Outsourced Data
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Cheng Guo | Yingmo Jie | Ruhan Zhuang | Xinyu Tang | Cheng Guo | Xinyu Tang | Yingmo Jie | Ruhan Zhuang
[1] Wei Guo,et al. A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[2] Laks V. S. Lakshmanan,et al. ProbView: a flexible probabilistic database system , 1997, TODS.
[3] Hector Garcia-Molina,et al. The Management of Probabilistic Data , 1992, IEEE Trans. Knowl. Data Eng..
[4] Hans-Peter Kriegel,et al. Probabilistic Similarity Join on Uncertain Data , 2006, DASFAA.
[5] Fabrizio Angiulli,et al. Indexing Uncertain Data in General Metric Spaces , 2012, IEEE Transactions on Knowledge and Data Engineering.
[6] Jianmin Wang,et al. Effectively Indexing the Uncertain Space , 2010, IEEE Transactions on Knowledge and Data Engineering.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Yufei Tao,et al. Range search on multidimensional uncertain data , 2007, TODS.
[9] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[10] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[11] Florian Kerschbaum,et al. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.
[12] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[13] Xue Chen,et al. Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption , 2020, IEEE Transactions on Services Computing.
[14] Tao Jiang,et al. A Lightweight Authenticated Communication Scheme for Smart Grid , 2016, IEEE Sensors Journal.
[15] Heng Tao Shen,et al. Effectively Indexing the Multidimensional Uncertain Objects , 2014, IEEE Transactions on Knowledge and Data Engineering.
[16] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[17] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[18] Susanne E. Hambrusch,et al. Indexing Uncertain Categorical Data , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[19] Kim-Kwang Raymond Choo,et al. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.
[20] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[21] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[23] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[24] Cheng Guo,et al. Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).
[25] Paul Rad,et al. Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging , 2017, IEEE Cloud Computing.
[26] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[27] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[28] Dario Fiore,et al. Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.