Contextual Oblivious Similarity Searching for Encrypted Data on Cloud Storage Services
暂无分享,去创建一个
[1] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[2] Lars R. Knudsen,et al. Advanced Encryption Standard (AES) - An Update , 1999, IMACC.
[3] Sungyoung Lee,et al. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services , 2016, PloS one.
[4] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Horacio González-Vélez,et al. Streaming Dynamic Coarse-Grained CPU/GPU Workloads with Heterogeneous Pipelines in FastFlow , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[10] Derek Greene,et al. Practical solutions to the problem of diagonal dominance in kernel document clustering , 2006, ICML.
[11] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[12] Qiang Tang. Search in Encrypted Data: Theoretical Models and Practical Applications , 2012, IACR Cryptol. ePrint Arch..
[13] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[14] Xingming Sun,et al. Semantic-Aware Searching Over Encrypted Data for Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[15] Horacio González-Vélez,et al. Automated Instantiation of Heterogeneous Fast Flow CPU/GPU Parallel Pattern Applications in Clouds , 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[16] Wajahat Ali Khan,et al. OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain , 2017, PloS one.
[17] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[18] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[19] David Sánchez,et al. Privacy-preserving data outsourcing in the cloud via semantic data splitting , 2017, Comput. Commun..
[20] Bo Lang,et al. Semantic-based Compound Keyword Search over Encrypted Cloud Data , 2019 .
[21] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.