Memory Leakage-Resilient Dynamic and Verifiable Multi-Keyword Ranked Search on Encrypted Smart Body Sensor Network Data
暂无分享,去创建一个
Hung-Min Sun | Chin-Chen Chang | Kim-Kwang Raymond Choo | Lanxiang Chen | Zhenchao Chen | Chinchen Chang | Hung-Min Sun | K. Choo | Lanxiang Chen | Zhenchao Chen
[1] Jia Yu,et al. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data , 2017, Inf. Sci..
[2] Kyriakos Mouratidis,et al. Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..
[3] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[4] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Fatos Xhafa,et al. Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..
[6] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[7] Jianfeng Ma,et al. VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings , 2017, Pervasive Mob. Comput..
[8] Hassan Ghasemzadeh,et al. Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges , 2017, Inf. Fusion.
[9] Shuming Zhou,et al. A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack , 2018 .
[10] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[11] Ruixuan Li,et al. Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..
[12] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[13] Sebastian Gajek. Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption , 2016, CT-RSA.
[14] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[15] Stefan Katzenbeisser,et al. Physically Uncloneable Functions in the Universal Composition Framework , 2011, CRYPTO.
[16] Fangguo Zhang,et al. Memory leakage-resilient searchable symmetric encryption , 2016, Future Gener. Comput. Syst..
[17] Nan Zhang,et al. DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data , 2017, Soft Comput..
[18] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[19] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[20] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[21] Giancarlo Fortino,et al. A framework for collaborative computing and multi-sensor data fusion in body sensor networks , 2015, Inf. Fusion.
[22] V. Sridhar Reddy,et al. An Efficient Privacy-Preserving Ranked Keyword Search Method , 2018 .
[23] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.
[24] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[25] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[26] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[27] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[28] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[29] Indrajit Ray,et al. Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup , 2016, Trans. Data Priv..
[30] Minglu Li,et al. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , 2013, IEEE Transactions on Dependable and Secure Computing.
[31] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[32] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[33] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[34] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[35] Jian Shen,et al. Towards achieving flexible and verifiable search for outsourced database in cloud computing , 2017, Future Gener. Comput. Syst..
[36] Yiwei Thomas Hou,et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[37] Baisa L. Gunjal,et al. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016 .
[38] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[39] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.