Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud
暂无分享,去创建一个
Zongda Wu | Hong Zhu | Gang Peng | Zhuolin Mei | Zongmin Cui | Bin Wu | Caicai Zhang | Zongda Wu | Zongmin Cui | Hong Zhu | Bin Wu | Zhuolin Mei | Gang Peng | Caicai Zhang
[1] Philip S. Yu,et al. Constructing plausible innocuous pseudo queries to protect user query intention , 2015, Inf. Sci..
[2] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[3] Zongda Wu,et al. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation , 2018, IEEE Transactions on Services Computing.
[4] Yiwei Thomas Hou,et al. Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[5] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[7] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[8] Peng Wang,et al. Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[9] Younho Lee. Secure Ordered Bucketization , 2014, IEEE Transactions on Dependable and Secure Computing.
[10] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[11] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[12] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[13] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.
[14] Keke Chen,et al. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.
[15] Feifei Li,et al. Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[16] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[17] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[18] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[19] Rui Li,et al. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing , 2014, Proc. VLDB Endow..
[20] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[21] Xiang Cheng,et al. Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments , 2018, IEEE Transactions on Services Computing.
[22] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[23] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.