Efficient Secure and Verifiable Location-Based Skyline Queries over Encrypted Data
暂无分享,去创建一个
[1] Xuemin Lin,et al. Continuous monitoring of moving skyline and top-k queries , 2021, The VLDB Journal.
[2] Xiangjian He,et al. Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data , 2021, IEEE Transactions on Dependable and Secure Computing.
[3] Ximeng Liu,et al. CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud , 2020, Inf. Sci..
[4] Jianxin Li,et al. SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform* , 2020, 2020 IEEE 36th International Conference on Data Engineering (ICDE).
[5] Cyrus Shahabi,et al. Secure Dynamic Skyline Queries Using Result Materialization , 2020, 2021 IEEE 37th International Conference on Data Engineering (ICDE).
[6] Jiangtao Cui,et al. SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud , 2020, DASFAA.
[7] Guoliang Li,et al. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[8] Ximeng Liu,et al. CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query , 2019, IEEE Internet of Things Journal.
[9] Jianliang Xu,et al. vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases , 2018, SIGMOD Conference.
[10] Robert H. Deng,et al. PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[11] Jian Pei,et al. Secure and Efficient Skyline Queries on Encrypted Data , 2018, IEEE Transactions on Knowledge and Data Engineering.
[12] Jae-Woo Chang,et al. A secure kNN query processing algorithm using homomorphic encryption on outsourced database , 2017, Data Knowl. Eng..
[13] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..
[14] Jian Pei,et al. Secure Skyline Queries on Cloud Platform , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[15] David J. Wu,et al. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..
[16] Jianfeng Ma,et al. Efficient and privacy-preserving skyline computation framework across domains , 2016, Future Gener. Comput. Syst..
[17] Rui Zhang,et al. Secure outsourced skyline query processing via untrusted cloud service providers , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[18] David J. Wu,et al. Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.
[19] Lu Li,et al. Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[20] Elisa Bertino,et al. Secure kNN Query Processing in Untrusted Cloud Environments , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Jianliang Xu,et al. Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..
[22] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[23] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[24] Muhammad Aamir Cheema,et al. A safe zone based approach for monitoring moving skyline queries , 2013, EDBT '13.
[25] Gabriel Ghinita,et al. Authenticating spatial skyline queries with low communication overhead , 2013, CODASPY.
[26] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[27] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[28] Jianliang Xu,et al. Authentication of location-based skyline queries , 2011, CIKM '11.
[29] Man Lung Yiu,et al. Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[30] Stavros Papadopoulos,et al. Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..
[31] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[32] Yin Yang,et al. Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.
[33] Ken C. K. Lee,et al. Location-Dependent Skyline Query , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[34] Bernhard Seeger,et al. Efficient Computation of Reverse Skyline Queries , 2007, VLDB.
[35] Anthony K. H. Tung,et al. Continuous Skyline Queries for Moving Objects , 2006, IEEE Transactions on Knowledge and Data Engineering.
[36] Cyrus Shahabi,et al. The spatial skyline queries , 2006, VLDB.
[37] Bernhard Seeger,et al. Progressive skyline computation in database systems , 2005, TODS.
[38] Jan Chomicki,et al. Skyline with presorting , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[39] Donald Kossmann,et al. Shooting Stars in the Sky: An Online Algorithm for Skyline Queries , 2002, VLDB.
[40] Donald Kossmann,et al. The Skyline operator , 2001, Proceedings 17th International Conference on Data Engineering.
[41] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[42] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[43] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[44] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .