A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[2] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[3] Shundong Li,et al. Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor , 2012, PAISI.
[4] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[5] Alistair Moffat,et al. Exploring the similarity space , 1998, SIGF.
[6] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[9] Helger Lipmaa,et al. First CPIR Protocol with Data-Dependent Computation , 2009, ICISC.
[10] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[11] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[12] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[13] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[14] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[15] Erkay Savas,et al. Efficient and secure ranked multi-keyword search on encrypted cloud data , 2012, EDBT-ICDT '12.
[16] Din J. Wasem,et al. Mining of Massive Datasets , 2014 .
[17] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[18] Peishun Wang,et al. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data , 2009, WISA.
[19] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[20] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[21] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.