Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
暂无分享,去创建一个
[1] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[2] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[3] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[4] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[5] Shuping Dang,et al. Machine Learning Aided Anonymization of Spatiotemporal Trajectory Datasets , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] S. Subramanian,et al. Genetic algorithm for embedding a complete graph in a hypercube with a VLSI application , 1994, Microprocess. Microprogramming.
[7] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[8] Vincenzo Iovino,et al. Private-Key Hidden Vector Encryption with Key Confidentiality , 2009, CANS.
[9] Marco Gruteser,et al. USENIX Association , 1992 .
[10] Xiaoqing Li,et al. Privacy-area aware dummy generation algorithms for Location-Based Services , 2014, 2014 IEEE International Conference on Communications (ICC).
[11] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] A. Volgenant,et al. A shortest augmenting path algorithm for dense and sparse linear assignment problems , 1987, Computing.
[13] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[14] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[15] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[16] O. Coudert,et al. Two-level logic minimization , 2001 .
[17] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Gabriel Ghinita,et al. An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical , 2014, CODASPY '14.
[19] Dongxi Liu,et al. Result Pattern Hiding Searchable Encryption for Conjunctive Queries , 2018, CCS.
[20] Cyrus Shahabi,et al. A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace , 2019, SIGSPATIAL/GIS.
[21] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.