A Parity-Based Data Outsourcing Model for Query Authentication and Correction
暂无分享,去创建一个
Ying Cai | Shixin Tian | Zhenbi Hu | Ying Cai | Shixin Tian | Zhenbi Hu
[1] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[2] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[3] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[4] Man Lung Yiu,et al. Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[5] Yin Yang,et al. Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.
[6] Jianliang Xu,et al. Authenticating Location-Based Skyline Queries in Arbitrary Subspaces , 2014, IEEE Transactions on Knowledge and Data Engineering.
[7] Jianliang Xu,et al. Authentication of location-based skyline queries , 2011, CIKM '11.
[8] Kian-Lee Tan,et al. Authenticating Multi-dimensional Query Results in Data Publishing , 2006, DBSec.
[9] R. Cuninghame-Green,et al. Applied Linear Algebra , 1979 .
[10] Cyrus Shahabi,et al. Spatial Query Integrity with Voronoi Neighbors , 2013, IEEE Transactions on Knowledge and Data Engineering.
[11] G. David Forney,et al. Generalized minimum distance decoding , 1966, IEEE Trans. Inf. Theory.
[12] David Chase,et al. Code Combining - A Maximum-Likelihood Decoding Approach for Combining an Arbitrary Number of Noisy Packets , 1985, IEEE Transactions on Communications.
[13] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[14] M. Chiani. Error Detecting and Error Correcting Codes , 2012 .
[15] Yuzhe Tang,et al. Outsourcing multi-version key-value stores with verifiable data freshness , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[16] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[17] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[18] Kian-Lee Tan,et al. Authenticating kNN Query Results in Data Publishing , 2007, Secure Data Management.
[19] Cyrus Shahabi,et al. Authentication of k Nearest Neighbor Query on Road Networks , 2014, IEEE Transactions on Knowledge and Data Engineering.
[20] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[21] Mikhail J. Atallah,et al. Efficient Distributed Third-Party Data Authentication for Tree Hierarchies , 2008, 2008 The 28th International Conference on Distributed Computing Systems.