-
1
-
-
79951999348
-
Study on cloud computing security
-
Feng Deng-guo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.
-
(2011)
Journal of Software
, vol.22
, Issue.1
, pp. 71-83
-
-
Feng, D.-G.1
Zhang, M.2
Zhang, Y.3
-
2
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton
-
Vaidya J, Clifton C. Privacy preserving association rule mining in vertically partitioned data[C]//Proceedings of the eighth ACM SIGKDD. Edmonton, 2002: 639-644.
-
(2002)
Proceedings of the eighth ACM SIGKDD
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
4
-
-
33744743349
-
Privacy protection in the relative position determination for two spatial geometric objects
-
Luo Yong-long, Huang Liu-sheng, Jing Wei-wei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416.
-
(2006)
Journal of Computer Research and Development
, vol.43
, Issue.3
, pp. 410-416
-
-
Luo, Y.-L.1
Huang, L.-S.2
Jing, W.-W.3
-
5
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
Murugesan M, Jiang W, Clifton C, et al. Efficient privacy-preserving similar document detection[J]. The VLDB Journal, 2010, 19(4): 457-475.
-
(2010)
The VLDB Journal
, vol.19
, Issue.4
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
-
8
-
-
77950572596
-
Server transparent query authentication of outsourced database
-
Zhang Min, Hong Cheng, Chen Chi. Server transparent query authentication of outsourced database[J]. Journal of Computer Research and Development, 2010, 47(1): 182-190.
-
(2010)
Journal of Computer Research and Development
, vol.47
, Issue.1
, pp. 182-190
-
-
Zhang, M.1
Hong, C.2
Chen, C.3
-
10
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
Li F, Hadjieleftheriou M, Kollios G, et al. Authenticated index structures for aggregation queries[J]. ACM Transactions on Information and System Security, 2010, 13(4): 1-30.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.4
, pp. 1-30
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
-
11
-
-
67649510426
-
Authenticated indexing for outsourced spatial databases
-
Yang Y, Papadopoulos S, Papadias D, et al. Authenticated indexing for outsourced spatial databases[J]. The VLDB Journal, 2009, 18(3): 631-648.
-
(2009)
The VLDB Journal
, vol.18
, Issue.3
, pp. 631-648
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
-
12
-
-
77954281765
-
An integrity checking scheme in outsourced database model
-
Xian He-qun, Feng Deng-guo. An integrity checking scheme in outsourced database model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.
-
(2010)
Journal of Computer Research and Development
, vol.47
, Issue.6
, pp. 1107-1115
-
-
Xian, H.-Q.1
Feng, D.-G.2
-
13
-
-
80051555582
-
Data outsourcing authentication model based on authenticated data structures for cloud computing
-
Xu Jian, Zhou Fu-cai, Chen Xu, et al. Data outsourcing authentication model based on authenticated data structures for cloud computing[J]. Journal on Communications, 2011, 32(7): 153-160.
-
(2011)
Journal on Communications
, vol.32
, Issue.7
, pp. 153-160
-
-
Xu, J.1
Zhou, F.-C.2
Chen, X.3
|