-
2
-
-
68249129760
-
-
University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
77953302790
-
-
Referenced online at June
-
Google, "Britney spears spelling correction," Referenced online at http://www.google.com/jobs/britney.html, June 2009.
-
(2009)
Britney Spears Spelling Correction
-
-
-
8
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of EUROCRYP'04, 2004.
-
Proc. of EUROCRYP'04, 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of ACM CCS'06, 2006.
-
Proc. of ACM CCS'06, 2006
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
77954747181
-
Bed-tree: An all-purpose index structure for string similarity search based on edit distance
-
Z. Zhang, M. Hadjieleftheriou, B. C. Ooi, and D. Srivastava, "Bed-tree: an all-purpose index structure for string similarity search based on edit distance," in Proc. of SIGMOD, 2010, pp. 915-926.
-
Proc. of SIGMOD, 2010
, pp. 915-926
-
-
Zhang, Z.1
Hadjieleftheriou, M.2
Ooi, B.C.3
Srivastava, D.4
-
13
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. of ICDCS'10, 2010.
-
Proc. of ICDCS'10, 2010
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
14
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. of INFOCOM, 2011.
-
Proc. of INFOCOM, 2011
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
15
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," in Proc. of CRYPTO, 2005.
-
Proc. of CRYPTO, 2005
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
16
-
-
33745120364
-
Secure Conjunctive Keyword Search over Encrypted Data
-
P. Golle, J. Staddon, and B. R. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," in Proc. of ACNS'04, 2004, pp. 31-45.
-
Proc. of ACNS'04, 2004
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
17
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC, 2007, pp. 535-554.
-
Proc. of TCC, 2007
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
18
-
-
34548774576
-
Multidimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig, "Multidimensional range query over encrypted data," in Proc. of IEEE Symposium on Security and Privacy, 2007.
-
Proc. of IEEE Symposium on Security and Privacy, 2007
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
19
-
-
0002619432
-
Binary codes capable of correcting spurious insertions and deletions of ones
-
V. Levenshtein, "Binary codes capable of correcting spurious insertions and deletions of ones," Problems of Information Transmission, vol. 1, no. 1, pp. 8-17, 1965.
-
(1965)
Problems of Information Transmission
, vol.1
, Issue.1
, pp. 8-17
-
-
Levenshtein, V.1
-
20
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. of IEEE INFOCOM'10 Mini-Conference, 2010.
-
Proc. of IEEE INFOCOM'10 Mini-Conference, 2010
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
21
-
-
84865633750
-
Efficient interactive fuzzy keyword search
-
S. Ji, G. Li, C. Li, and J. Feng, "Efficient interactive fuzzy keyword search," in Proc. of WWW'09, 2009.
-
Proc. of WWW'09, 2009
-
-
Ji, S.1
Li, G.2
Li, C.3
Feng, J.4
-
22
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
23
-
-
80051864290
-
Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare
-
J. Sun, X. Zhu, C. Zhang, and Y. Fang, "Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare," in Proc. of ICDCS, 2011.
-
Proc. of ICDCS, 2011
-
-
Sun, J.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
24
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: ensuring privacy of electronic medical records," in Proc. of the 1st ACM workshop on Cloud Computing security, 2009.
-
Proc. of the 1st ACM Workshop on Cloud Computing Security, 2009
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
25
-
-
84921683893
-
Authorized private keyword search over encrypted personal health records in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," in Proc. of ICDCS, 2011.
-
Proc. of ICDCS, 2011
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
26
-
-
70449569012
-
Ensuring Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, 2009.
-
Proc. of IWQoS'09, 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
27
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. of ESORICS'09, Saint Malo, France, Sep. 2009.
-
Proc. of ESORICS'09, Saint Malo, France, Sep. 2009
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|