Secure Index for Resource-Constraint Mobile Devices in Cloud Computing
暂无分享,去创建一个
Zhe Xia | Junwei Zhou | Hanbing Yao | Nana Xing | Junwei Zhou | Zhe Xia | Nana Xing | Hanbing Yao
[1] Hao Wang,et al. Wearable Sensor Localization Considering Mixed Distributed Sources in Health Monitoring Systems , 2016, Sensors.
[2] Ha T. Lam,et al. Encryption Performance Improvements of the Paillier Cryptosystem , 2015, IACR Cryptol. ePrint Arch..
[3] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[4] Minglu Li,et al. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , 2013, IEEE Transactions on Dependable and Secure Computing.
[5] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[6] Guangjie Han,et al. PD Source Diagnosis and Localization in Industrial High-Voltage Insulation System via Multimodal Joint Sparse Representation , 2016, IEEE Transactions on Industrial Electronics.
[7] Sasu Tarkoma,et al. Theory and Practice of Bloom Filters for Distributed Systems , 2012, IEEE Communications Surveys & Tutorials.
[8] Tao Xiang,et al. Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[9] Hugh E. Williams,et al. In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems , 2004, ACSC.
[10] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[11] Quan Yuan,et al. A framework for protecting personal information and privacy , 2015, Secur. Commun. Networks.
[12] Yue Zhang,et al. Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense , 2016, Intell. Autom. Soft Comput..
[13] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.
[14] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[15] Kirit J. Modi,et al. Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[16] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[17] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[20] Ning Sun,et al. Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.
[21] Guangjie Han,et al. The Application of DOA Estimation Approach in Patient Tracking Systems with High Patient Density , 2016, IEEE Transactions on Industrial Informatics.
[22] Mohsen Guizani,et al. An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.
[23] R. Kalaiselvi,et al. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .
[24] Jin Li,et al. Fully secure fuzzy identity-based encryption for secure IoT communications , 2016, Comput. Stand. Interfaces.
[25] Guangjie Han,et al. An Efficient Virtual Machine Consolidation Scheme for Multimedia Cloud Computing , 2016, Sensors.
[26] Weixin Xie,et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[27] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[28] Oscar Reparaz. A note on the security of Higher-Order Threshold Implementations , 2015, IACR Cryptol. ePrint Arch..
[29] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[30] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption , 2013 .
[31] George Varghese,et al. An Improved Construction for Counting Bloom Filters , 2006, ESA.
[32] V. Sridhar Reddy,et al. An Efficient Privacy-Preserving Ranked Keyword Search Method , 2018 .
[33] Guangjie Han,et al. Distributed Parameter Estimation for Mobile Wireless Sensor Network Based on Cloud Computing in Battlefield Surveillance System , 2015, IEEE Access.
[34] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[35] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .