Authenticated Spatio-Textual Similarity Joins in Untrusted Cloud Environments
暂无分享,去创建一个
Xiang Cheng | Jianliang Xu | Han Yan | Sen Su | Qiying Zhang
[1] Jianliang Xu,et al. Authentication of location-based skyline queries , 2011, CIKM '11.
[2] Cyrus Shahabi,et al. Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.
[3] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[4] Feifei Li,et al. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams , 2007, VLDB.
[5] Jianliang Xu,et al. Authentication of Moving Top-k Spatial Keyword Queries , 2015, IEEE Transactions on Knowledge and Data Engineering.
[6] Xiang Cheng,et al. Authentication of Top-k Spatial Keyword Queries in Outsourced Databases , 2015, DASFAA.
[7] Kyriakos Mouratidis,et al. Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[8] Roberto J. Bayardo,et al. Scaling up all pairs similarity search , 2007, WWW '07.
[9] Surajit Chaudhuri,et al. A Primitive Operator for Similarity Joins in Data Cleaning , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[10] Hans-Peter Kriegel,et al. The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.
[11] Jeffrey Xu Yu,et al. Efficient similarity joins for near-duplicate detection , 2011, TODS.
[12] Jianliang Xu,et al. Authenticating location-based services without compromising location privacy , 2012, SIGMOD Conference.
[13] Jianliang Xu,et al. Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..
[14] Man Lung Yiu,et al. Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[15] Chi Zhang,et al. Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.
[16] Stavros Papadopoulos,et al. Lightweight authentication of linear algebraic queries on data streams , 2013, SIGMOD '13.
[17] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[18] Man Lung Yiu,et al. Authentication of moving range queries , 2012, CIKM '12.
[19] Kyriakos Mouratidis,et al. Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..
[20] Sunita Sarawagi,et al. Efficient set joins on similarity predicates , 2004, SIGMOD '04.
[21] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[22] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.
[23] Nikos Mamoulis,et al. Spatio-textual similarity joins , 2012, Proc. VLDB Endow..
[24] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[25] Jianjun Li,et al. Authentication of Reverse k Nearest Neighbor Query , 2015, DASFAA.