Cross-lingual multi-keyword rank search with semantic extension over encrypted data
暂无分享,去创建一个
Longfei Wu | Yuanzhang Li | Xueyan Liu | Ruzhi Xu | Jun Wu | Zhitao Guan | Jinhu Zhang | Jun Wu | Zhitao Guan | Longfei Wu | Ruzhi Xu | Jinhu Zhang | Yuan-zhang Li | Xueyan Liu
[1] Yu Zhang,et al. Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..
[2] Jianhua Li,et al. Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Francis Bond,et al. Linking and Extending an Open Multilingual Wordnet , 2013, ACL.
[5] Jian Shen,et al. Towards achieving flexible and verifiable search for outsourced database in cloud computing , 2017, Future Gener. Comput. Syst..
[6] Xingming Sun,et al. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.
[7] Robert H. Deng,et al. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data , 2018, IEEE Transactions on Dependable and Secure Computing.
[8] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[9] Siu-Ming Yiu,et al. HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..
[10] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[11] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[14] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[15] Keke Gai,et al. Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..
[16] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[17] Jin Li,et al. Verifiable searchable encryption with aggregate keys for data sharing system , 2018, Future Gener. Comput. Syst..
[18] Cong Wang,et al. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[19] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[20] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[21] Yong Gan,et al. A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .
[22] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[23] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[24] Xiaofeng Chen,et al. Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things , 2019, J. Netw. Comput. Appl..
[25] Robert H. Deng,et al. Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language , 2020, IEEE Transactions on Dependable and Secure Computing.
[26] Mianxiong Dong,et al. Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet , 2019, IEEE Communications Magazine.
[27] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[28] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[29] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[30] Liehuang Zhu,et al. Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems , 2021, IEEE Transactions on Dependable and Secure Computing.
[31] Song Guo,et al. An Efficient Privacy-Preserving Ranked Keyword Search Method , 2016, IEEE Transactions on Parallel and Distributed Systems.
[32] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[33] Lu Liu,et al. A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..
[34] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.
[35] Mohsen Guizani,et al. PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[36] Sai Ji,et al. Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.