Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy
暂无分享,去创建一个
Ron Steinfeld | Rafael Dowsley | Surya Nepal | Amin Sakzad | Shabnam Kasra Kermanshahi | Joseph K. Liu | Xun Yi | S. Nepal | Ron Steinfeld | Rafael Dowsley | A. Sakzad | X. Yi | S. K. Kermanshahi
[1] Alon Efrat,et al. Data inference from encrypted databases: a multi-dimensional order-preserving matching approach , 2020, MobiHoc.
[2] Jian Wang,et al. Efficient and secure multi-dimensional geometric range query over encrypted data in cloud , 2019, J. Parallel Distributed Comput..
[3] Bo Qin,et al. MixGeo: Efficient Secure Range Queries on Encrypted Dense Spatial Data in the Cloud , 2019, 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS).
[4] Xiaodong Lin,et al. Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data , 2019, IEEE Transactions on Information Forensics and Security.
[5] Brice Minaud,et al. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives , 2017, CCS.
[6] Adam O'Neill,et al. Generic Attacks on Secure Outsourced Databases , 2016, CCS.
[7] David Cash,et al. What Else is Revealed by Order-Revealing Encryption? , 2016, IACR Cryptol. ePrint Arch..
[8] Cheng Huang,et al. An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud , 2016, IEEE Transactions on Vehicular Technology.
[9] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[10] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[11] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[12] Juan A. Garay,et al. Practical and Secure Solutions for Integer Comparison , 2007, Public Key Cryptography.
[13] Pankaj K. Agarwal,et al. Geometric Range Searching and Its Relatives , 2007 .
[14] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[15] Mario A. López,et al. R-trees , 2004, Handbook of Data Structures and Applications.
[16] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[17] Jirí Matousek,et al. Geometric range searching , 1994, CSUR.