An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
暂无分享,去创建一个
Zhihua Xia | Xingming Sun | Jin Wang | Li Chen | Xingming Sun | Zhihua Xia | Li Chen | Jin Wang | Xingming Sun
[1] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[2] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[4] Rico Sennrich,et al. Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics , 2012 .
[5] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[6] Weiming Zhang,et al. A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data , 2012, 2012 International Conference on Cloud and Service Computing.
[7] Susan T. Dumais,et al. Latent Semantic Indexing (LSI) and TREC-2 , 1993, TREC.
[8] David M. W. Powers,et al. The Problem with Kappa , 2012, EACL.
[9] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..
[10] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[12] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[13] Richard A. Harshman,et al. Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..
[14] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[15] Bharat K. Bhargava,et al. International journal of security and its applications , 2013 .
[16] David L. Olson,et al. Advanced Data Mining Techniques , 2008 .
[17] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[18] M. Chuah,et al. Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[19] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.