Effective Data Utilization in Public Cloud through Hash Table Assorted Trie Indexed Encrypted Fuzzy Search
暂无分享,去创建一个
[1] Grace T. R. Lin,et al. Fuzzy Modeling for Information Security Management Issues in Cloud Computing , 2014 .
[2] Debajyoti Mukhopadhyay,et al. Efficient Fuzzy Search Engine with B -Tree Search Mechanism , 2014, 2014 International Conference on Information Technology.
[3] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[4] He Jing,et al. K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing , 2013 .
[5] Cong Wang,et al. Toward secure and effective data utilization in public cloud , 2012, IEEE Network.
[6] Shouzhen Zeng,et al. Fuzzy Generalized Ordered Weighted Averaging Distance Operator and Its Application to Decision Making , 2012 .
[7] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[8] Sun-Yuan Hsieh,et al. Multiprefix Trie: A New Data Structure for Designing Dynamic Router-Tables , 2011, IEEE Transactions on Computers.
[9] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[10] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[11] Yujian Du,et al. Cloud Computing: An Overview , 2009, CloudCom.
[12] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[13] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[14] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[15] S. Subbotin,et al. The decision tree construction based on a stochastic search for the neuro-fuzzy network synthesis , 2015, Optical Memory and Neural Networks.
[16] Qiang Tang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[17] Min-Shiang Hwang,et al. A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..
[18] Qiang Tang,et al. A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[19] Hai Jin,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2010, IACR Cryptol. ePrint Arch..
[20] Sartaj Sahni,et al. Efficient Construction of Pipelined Multibit-Trie Router-Tables , 2007, IEEE Transactions on Computers.