Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
暂无分享,去创建一个
Fengyong Li | K. Lu | M. Wen | Jinguo Li | Kui Wu | Hongjiao Li
[1] Laurence T. Yang,et al. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.
[2] Lei Zhang,et al. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing , 2016, Secur. Commun. Networks.
[3] Mianxiong Dong,et al. Private and Flexible Urban Message Delivery , 2016, IEEE Transactions on Vehicular Technology.
[4] Xiaohui Liang,et al. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[5] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[6] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[7] Juhnyoung Lee,et al. A view of cloud computing , 2010, CACM.
[8] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[9] Yeim-Kuan Chang,et al. Fast binary and multiway prefix searches for packet forwarding , 2007, Comput. Networks.
[10] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[11] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[12] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[13] Paul E. Jones,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[14] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[15] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[16] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[17] M. V. Ramakrishna,et al. Practical performance of Bloom filters and parallel free-text searching , 1989, CACM.
[18] Ambadas Wairagar,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2016 .
[19] Mianxiong Dong,et al. NetSecCC: A scalable and fault-tolerant architecture for cloud computing security , 2016, Peer-to-Peer Netw. Appl..
[20] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[21] Karl N. Levitt,et al. hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost , 2015, IEEE Transactions on Dependable and Secure Computing.
[22] Miguel Correia,et al. Efficient Byzantine Fault-Tolerance , 2013, IEEE Transactions on Computers.
[23] Hai Jin,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2010, IACR Cryptol. ePrint Arch..
[24] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[25] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[26] Alex X. Liu,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .