-
1
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Berkeley, Feb.
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing, " University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
-
(2009)
University of California, Tech. Rep. UCB-EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
80051911576
-
Cryptographic cloud storage
-
January, LNCS. Springer, Heidelberg
-
S. Kamara and K. Lauter, "Cryptographic cloud storage, " in RLCPS, January 2010, LNCS. Springer, Heidelberg.
-
(2010)
RLCPS
-
-
Kamara, S.1
Lauter, K.2
-
3
-
-
26444501752
-
Algorithmics and applications of tree and graph searching
-
D. Shasha, J.-L. Wang, and R. Giugno, "Algorithmics and applications of tree and graph searching, " in Proc. of PODS, 2002.
-
(2002)
Proc. of PODS
-
-
Shasha, D.1
Wang, J.-L.2
Giugno, R.3
-
4
-
-
3142736597
-
Graph indexing: A frequent structurebased approach
-
X. Yan, P. S. Yu, and J. Han, "Graph indexing: a frequent structurebased approach, " in Proc. of SIGMOD, 2004.
-
(2004)
Proc. of SIGMOD
-
-
Yan, X.1
Yu, P.S.2
Han, J.3
-
6
-
-
34548731280
-
Treepi: A novel graph indexing method
-
S. Zhang, M. Hu, and J. Yang, "Treepi: A novel graph indexing method, " in Proc. of ICDE, 2007.
-
(2007)
Proc. of ICDE
-
-
Zhang, S.1
Hu, M.2
Yang, J.3
-
7
-
-
35448982399
-
Fg-index: Towards verification-free query processing on graph databases
-
J. Cheng, Y. Ke, W. Ng, and A. Lu, "Fg-index: towards verification-free query processing on graph databases, " in Proc. of SIGMOD, 2007.
-
(2007)
Proc. of SIGMOD
-
-
Cheng, J.1
Ke, Y.2
Ng, W.3
Lu, A.4
-
8
-
-
84859197018
-
Taming verification hardness: An efficient algorithm for testing subgraph isomorphism
-
H. Shang, Y. Zhang, X. Lin, and J. X. Yu, "Taming verification hardness: an efficient algorithm for testing subgraph isomorphism, " in Proc. of VLDB, 2008.
-
(2008)
Proc. of VLDB
-
-
Shang, H.1
Zhang, Y.2
Lin, X.3
Yu, J.X.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions, " in Proc. of ACM CCS, 2006.
-
(2006)
Proc. of ACM CCS
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Proc. of EUROCRYPT, 2004.
-
(2004)
Proc. of EUROCRYPT
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. of ICDCS, 2010.
-
(2010)
Proc. of ICDCS
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
13
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA, March
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing, " in Proc. of IEEE INFOCOM'10 Mini-Conference, San Diego, CA, USA, March 2010.
-
(2010)
Proc. of IEEE INFOCOM'10 Mini-Conference
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
14
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " in Proc. of INFOCOM, 2011.
-
(2011)
Proc. of INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
15
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases, " in Proc. of SIGMOD, 2009.
-
(2009)
Proc. of SIGMOD
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
16
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. of INFOCOM, 2010.
-
(2010)
Proc. of INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
17
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k retrieval from a confidential index, " in Proc. of EDBT, 2009.
-
(2009)
Proc. of EDBT
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
18
-
-
0003603813
-
-
Freeman, New York, NY, USA
-
M. R. Garey and D. S. Johnson, "Computers and intractability: A guide to the theory of np-completeness, " Freeman, New York, NY, USA, 1990.
-
(1990)
Computers and Intractability: A Guide to the Theory of Np-completeness
-
-
Garey, M.R.1
Johnson, D.S.2
-
19
-
-
78149333073
-
Gspan: Graph-based substructure pattern mining
-
X. Yan and J. Han, "gspan: Graph-based substructure pattern mining, " in Proc. of ICDM, 2002.
-
(2002)
Proc. of ICDM
-
-
Yan, X.1
Han, J.2
-
20
-
-
12244294066
-
A quickstart in frequent structure mining can make a difference
-
S. Nijssen and J. N. Kok, "A quickstart in frequent structure mining can make a difference, " in Proc. of SIGKDD, 2004.
-
(2004)
Proc. of SIGKDD
-
-
Nijssen, S.1
Kok, J.N.2
-
21
-
-
78149328300
-
Efficient mining of frequent subgraphs in the presence of isomorphism
-
J. Huan, W. Wang, and J. Prins, "Efficient mining of frequent subgraphs in the presence of isomorphism, " in Proc. of ICDM, 2003.
-
(2003)
Proc. of ICDM
-
-
Huan, J.1
Wang, W.2
Prins, J.3
-
23
-
-
43349086436
-
Zerber: R-confidential indexing for distributed documents
-
DOI 10.1145/1353343.1353380, Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
-
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, "Zerber: r-confidential indexing for distributed documents, " in Proc. of EDBT, 2008, pp. 287-298. (Pubitemid 351661710)
-
(2008)
Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
-
24
-
-
57049107456
-
Searching in encrypted data
-
PhD thesis
-
R. Brinkman, "Searching in encrypted data, " in University of Twente, PhD thesis, 2007.
-
(2007)
University of Twente
-
-
Brinkman, R.1
-
25
-
-
38049021884
-
Cryptography from anonymity
-
DOI 10.1109/FOCS.2006.25, 4031360, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Cryptography from anonymity, " in Proc. of FOCS, 2006, pp. 239-248. (Pubitemid 351175513)
-
(2006)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
26
-
-
72849130119
-
Gboost: A mathematical programming approach to graph classification and regression
-
H. Saigo, S. Nowozin, T. Kadowaki, T. Kudo, and K. Tsuda, "Gboost: A mathematical programming approach to graph classification and regression, " in Machine Learning, 2008.
-
(2008)
Machine Learning
-
-
Saigo, H.1
Nowozin, S.2
Kadowaki, T.3
Kudo, T.4
Tsuda, K.5
-
27
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Proc. of TCC, 2007, pp. 535-554.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
28
-
-
77957002082
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. of EUROCRYPT, 2010.
-
(2010)
Proc. of EUROCRYPT
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
|