-
1
-
-
77953302790
-
-
Referenced online at June
-
Google, "Britney spears spelling correction," Referenced online at http://www.google.com/jobs/britney.html, June 2009.
-
(2009)
Britney Spears Spelling Correction
-
-
-
2
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Proceedings of Crypto 2007, Springer-Verlag
-
M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in Proceedings of Crypto 2007, volume 4622 of LNCS. Springer-Verlag, 2007.
-
LNCS
, vol.4622
, pp. 2007
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
3
-
-
0033705124
-
Practical techniques for searches on encrypted data, in
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symposium on Security and Privacy'00, 2000.
-
Proc. of IEEE Symposium on Security and Privacy'00, 2000
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
4
-
-
33244488406
-
Secure indexes
-
Report 2003/216
-
E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, Report 2003/216, 2003, http://eprint.iacr.org/.
-
Cryptology ePrint Archive
, pp. 2003
-
-
Goh, E.-J.1
-
5
-
-
35048892905
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of EUROCRYP'04, 2004.
-
Proc. of EUROCRYP'04, 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
77952589508
-
Building an encrypted and searchable audit log
-
B. Waters, D. Balfanz, G. Durfee, and D. Smetters, "Building an encrypted and searchable audit log," in Proc. of 11th Annual Network and Distributed System, 2004.
-
Proc. of 11th Annual Network and Distributed System, 2004
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of ACM CCS'06, 2006.
-
Proc. of ACM CCS'06, 2006
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC'07, 2007, pp. 535-554.
-
Proc. of TCC'07, 2007
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
84858377499
-
Private query on encrypted data in multi-user settings
-
F. Bao, R. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," in Proc. of ISPEC'08, 2008.
-
Proc. of ISPEC'08, 2008
-
-
Bao, F.1
Deng, R.2
Ding, X.3
Yang, Y.4
-
11
-
-
52649086729
-
Efficient merging and filtering algorithms for approximate string searches
-
C. Li, J. Lu, and Y. Lu, "Efficient merging and filtering algorithms for approximate string searches," in Proc. of ICDE'08, 2008.
-
Proc. of ICDE'08, 2008
-
-
Li, C.1
Lu, J.2
Lu, Y.3
-
12
-
-
67649641448
-
Space-constrained gram-based indexing for efficient approximate string search
-
A. Behm, S. Ji, C. Li, , and J. Lu, "Space-constrained gram-based indexing for efficient approximate string search," in Proc. of ICDE'09.
-
Proc. of ICDE'09
-
-
Behm, A.1
Ji, S.2
Li, C.3
Lu, J.4
-
13
-
-
84865633750
-
Efficient interactive fuzzy keyword search
-
S. Ji, G. Li, C. Li, and J. Feng, "Efficient interactive fuzzy keyword search," in Proc. of WWW'09, 2009.
-
Proc. of WWW'09, 2009
-
-
Ji, S.1
Li, G.2
Li, C.3
Feng, J.4
-
14
-
-
0003241823
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N. Wright, "Secure multiparty computation of approximations," in Proc. of ICALP'01.
-
Proc. of ICALP'01
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.N.6
-
16
-
-
0002619432
-
Binary codes capable of correcting spurious insertions and deletions of ones
-
V. Levenshtein, "Binary codes capable of correcting spurious insertions and deletions of ones," Problems of Information Transmission, vol. 1, no. 1, pp. 8-17, 1965.
-
(1965)
Problems of Information Transmission
, vol.1
, Issue.1
, pp. 8-17
-
-
Levenshtein, V.1
|