Effective Data Utilization in Public Cloud through Hash Table Assorted Trie Indexed Encrypted Fuzzy Search
暂无分享,去创建一个
[1] Cong Wang,et al. Toward secure and effective data utilization in public cloud , 2012, IEEE Network.
[2] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[3] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[4] Min-Shiang Hwang,et al. A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..
[5] Libor Sarga,et al. Cloud Computing: An Overview , 2012 .
[6] A. A. Oliinyk,et al. The decision tree construction based on a stochastic search for the neuro-fuzzy network synthesis , 2015, Optical Memory and Neural Networks.
[7] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[8] Grace T. R. Lin,et al. Fuzzy Modeling for Information Security Management Issues in Cloud Computing , 2014 .
[9] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[10] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[11] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[12] Qiang Tang,et al. A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[13] Shouzhen Zeng,et al. Fuzzy Generalized Ordered Weighted Averaging Distance Operator and Its Application to Decision Making , 2012 .
[14] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[15] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[16] Qiang Tang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[17] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[18] He Jing,et al. K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing , 2013 .
[19] Sun-Yuan Hsieh,et al. Multiprefix Trie: A New Data Structure for Designing Dynamic Router-Tables , 2011, IEEE Transactions on Computers.
[20] Debajyoti Mukhopadhyay,et al. Efficient Fuzzy Search Engine with B -Tree Search Mechanism , 2014, 2014 International Conference on Information Technology.
[21] Sartaj Sahni,et al. Efficient Construction of Pipelined Multibit-Trie Router-Tables , 2007, IEEE Transactions on Computers.