Spatial Query Integrity with Voronoi Neighbors
暂无分享,去创建一个
Cyrus Shahabi | Spiridon Bakiras | Wei-Shinn Ku | Ling Hu | C. Shahabi | Wei-Shinn Ku | S. Bakiras | Ling Hu
[1] Xiaofeng Meng,et al. Integrity Auditing of Outsourced Data , 2007, VLDB.
[2] Bernhard Seeger,et al. Progressive skyline computation in database systems , 2005, TODS.
[3] Amos Fiat,et al. Batch RSA , 1989, Journal of Cryptology.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Haixun Wang,et al. Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases , 2009, SSTD.
[6] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[7] Yin Yang,et al. Continuous Spatial Authentication , 2009, SSTD.
[8] Man Lung Yiu,et al. Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[10] Cyrus Shahabi,et al. Verifying spatial queries using Voronoi neighbors , 2010, GIS '10.
[11] Cyrus Shahabi,et al. VoR-tree , 2010, Proc. VLDB Endow..
[12] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[13] Kian-Lee Tan,et al. Authenticating Multi-dimensional Query Results in Data Publishing , 2006, DBSec.
[14] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[15] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Gene Tsudik,et al. Signature Bouquets: Immutability for Aggregated/Condensed Signatures , 2004, ESORICS.
[17] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[18] Dimitris Sacharidis,et al. Partially materialized digest scheme: an efficient verification method for outsourced databases , 2008, The VLDB Journal.
[19] Kyriakos Mouratidis,et al. Scalable Verification for Outsourced Dynamic Databases , 2009, Proc. VLDB Endow..
[20] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[21] Kian-Lee Tan,et al. Authenticating kNN Query Results in Data Publishing , 2007, Secure Data Management.
[22] Philip S. Yu,et al. Dual encryption for query integrity assurance , 2008, CIKM '08.
[23] Yin Yang,et al. Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.
[24] Cyrus Shahabi,et al. Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases , 2004, VLDB.
[25] Mihir Bellare,et al. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.
[26] Kian-Lee Tan,et al. Query assurance verification for outsourced multi-dimensional databases , 2009, J. Comput. Secur..
[27] Cyrus Shahabi,et al. Processing spatial skyline queries in both vector spaces and spatial network databases , 2009, TODS.
[28] Kyriakos Mouratidis,et al. Aggregate nearest neighbor queries in spatial databases , 2005, TODS.
[29] Jianliang Xu,et al. Authentication of location-based skyline queries , 2011, CIKM '11.
[30] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[31] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[32] Yufei Tao,et al. Reverse kNN Search in Arbitrary Dimensionality , 2004, VLDB.