Authentication of Top-k Spatial Keyword Queries in Outsourced Databases
暂无分享,去创建一个
Xiang Cheng | Jianliang Xu | Peng Xu | Han Yan | Sen Su | Peng Tang
[1] Jianliang Xu,et al. Authentication of location-based skyline queries , 2011, CIKM '11.
[2] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Cyrus Shahabi,et al. Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.
[5] Hans-Peter Kriegel,et al. The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.
[6] Christian S. Jensen,et al. A framework for efficient spatial web object retrieval , 2012, The VLDB Journal.
[7] Naphtali Rishe,et al. Keyword Search on Spatial Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[8] Beng Chin Ooi,et al. Collective spatial keyword querying , 2011, SIGMOD '11.
[9] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[10] Jianliang Xu,et al. Authenticating Location-Based Skyline Queries in Arbitrary Subspaces , 2014, IEEE Transactions on Knowledge and Data Engineering.
[11] Kyriakos Mouratidis,et al. Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[12] Jianliang Xu,et al. Authenticating location-based services without compromising location privacy , 2012, SIGMOD Conference.
[13] Kyriakos Mouratidis,et al. Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..
[14] Anthony K. H. Tung,et al. Keyword Search in Spatial Databases: Towards Searching by Document , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[15] Feifei Li,et al. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams , 2007, VLDB.
[16] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[17] Yin Yang,et al. Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.
[18] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[19] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.
[20] Jianliang Xu,et al. Authentication of Moving Top-k Spatial Keyword Queries , 2015, IEEE Transactions on Knowledge and Data Engineering.
[21] Yin Yang,et al. Continuous authentication on relational streams , 2009, The VLDB Journal.
[22] Chi Zhang,et al. Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.
[23] Christian S. Jensen,et al. Efficient Retrieval of the Top-k Most Relevant Spatial Web Objects , 2009, Proc. VLDB Endow..
[24] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.
[25] Man Lung Yiu,et al. Authentication of moving range queries , 2012, CIKM '12.
[26] Jianliang Xu,et al. Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..
[27] Man Lung Yiu,et al. Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[28] Kian-Lee Tan,et al. Efficient safe-region construction for moving top-K spatial keyword queries , 2012, CIKM.