-
1
-
-
84864128069
-
Efficient and secure ranked multi-keyword search on encrypted cloud data
-
ACM New York 10.1145/2320765.2320820
-
Örencik, C.; Savaş, E.: Efficient and secure ranked multi-keyword search on encrypted cloud data. In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, pp. 186-195. ACM, New York (2012)
-
(2012)
Proceedings of the 2012 Joint EDBT/ICDT Workshops
, pp. 186-195
-
-
Örencik, C.1
Savaş, E.2
-
2
-
-
0032201622
-
Private information retrieval
-
1065.68524 1678848
-
Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M.: Private information retrieval. J. ACM 45, 965-981 (1998)
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
3
-
-
38049138213
-
Public key encryption that allows PIR queries
-
Lecture Notes in Computer Science 4622 Springer Berlin 10.1007/978-3-540-74143-5-4
-
Boneh, D.; Kushilevitz, E.; Ostrovsky, R.; Skeith, W.: Public key encryption that allows PIR queries. In: Advances in Cryptology (CRYPTO 2007). Lecture Notes in Computer Science, vol. 4622, pp. 50-67. Springer, Berlin (2007)
-
(2007)
Advances in Cryptology (CRYPTO 2007)
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
4
-
-
77954567837
-
First CPIR protocol with data-dependent computation
-
Springer Berlin
-
Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Information, Security and Cryptology (ICISC 2009), pp. 193-210. Springer, Berlin (2009)
-
(2009)
Information, Security and Cryptology (ICISC 2009)
, pp. 193-210
-
-
Lipmaa, H.1
-
5
-
-
79955529260
-
Multi-query computationally-private information retrieval with constant communication rate
-
Groth, J.; Kiayias, A.; Lipmaa, H.: Multi-query computationally-private information retrieval with constant communication rate. In: PKC, pp. 107-123 (2010)
-
(2010)
PKC
, pp. 107-123
-
-
Groth, J.1
Kiayias, A.2
Lipmaa, H.3
-
6
-
-
79251555651
-
Efficient computationally private information retrieval from anonymity or trapdoor groups
-
Trostle, J.T.; Parrish, A.: Efficient computationally private information retrieval from anonymity or trapdoor groups. In: ISC '10, pp. 114-128 (2010)
-
(2010)
ISC '10
, pp. 114-128
-
-
Trostle, J.T.1
Parrish, A.2
-
8
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
10.1145/1496091.1496100
-
Vaquero, L.M.; Rodero-Merino, L.; Caceres, J.; Lindner, M.: A break in the clouds: towards a cloud definition. Comput. Commun. Rev. 39, 50-55 (2008)
-
(2008)
Comput. Commun. Rev.
, vol.39
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
11
-
-
84870787249
-
-
Windows live mesh (2012). http://windows.microsoft.com/en-US/windows- live/essentials-other-programs?T1=t4
-
(2012)
Windows Live Mesh
-
-
-
12
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Springer Berlin 10.1007/11496137-30
-
Chang, Y.-C.; Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442-455. Springer, Berlin (2005)
-
(2005)
Applied Cryptography and Network Security
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
13
-
-
70749116607
-
An efficient privacy preserving keyword search scheme in cloud computing
-
Washington, DC, USA IEEE Comput. Soc. Los Alamitos 10.1109/CSE.2009.66
-
Liu, Q.; Wang, G.; Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, Vol. 02 (CSE '09), Washington, DC, USA, pp. 715-720. IEEE Comput. Soc.; Los Alamitos (2009)
-
(2009)
Proceedings of the 2009 International Conference on Computational Science and Engineering, Vol. 02 (CSE '09)
, pp. 715-720
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
14
-
-
1942420748
-
Oblivious keyword search
-
10.1016/j.jco.2003.08.023 1059.68050 2067437
-
Ogata, W.; Kurosawa, K.: Oblivious keyword search. J. Complex. 20, 356-371 (2004)
-
(2004)
J. Complex.
, vol.20
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
15
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
10.1007/978-3-540-30576-7-17
-
Freedman, M.J.; Ishai, Y.; Pinkas, B.; Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Theory of Cryptography Conference (TCC 2005), pp. 303-324 (2005)
-
(2005)
Theory of Cryptography Conference (TCC 2005)
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
17
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Wang, C.; Cao, N.; Li, J.; Ren, K.; Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS'10, pp. 253-262 (2010)
-
(2010)
ICDCS'10
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
18
-
-
84864234736
-
Efficient similarity search over encrypted data
-
Washington, DC, USA IEEE Comput. Soc. Los Alamitos 10.1109/ICDE.2012.23
-
Kuzu, M.; Islam, M.S.; Kantarcioglu, M.: Efficient similarity search over encrypted data. In: Proceedings of the 2012 IEEE 28th International Conference on Data Engineering (ICDE '12), Washington, DC, USA, pp. 1156-1167. IEEE Comput. Soc.; Los Alamitos (2012)
-
(2012)
Proceedings of the 2012 IEEE 28th International Conference on Data Engineering (ICDE '12)
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
19
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)
-
(2011)
IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
20
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
10.1016/j.jnca.2010.07.007
-
Zhang, B.; Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262-267 (2011)
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
-
21
-
-
70350676849
-
An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data
-
Lecture Notes in Computer Science Springer Berlin 10.1007/978-3-642- 00306-6-11
-
Wang, P.; Wang, H.; Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Information Security Applications. Lecture Notes in Computer Science, pp. 145-159. Springer, Berlin (2009)
-
(2009)
Information Security Applications
, pp. 145-159
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
22
-
-
84876811202
-
Rcv1: A new benchmark collection for text categorization research
-
Lewis, D.D.; Yang, Y.; Rose, T.G.; Li, F.: Rcv1: a new benchmark collection for text categorization research. J. Mach. Learn. Res. 5, 361-397 (2004)
-
(2004)
J. Mach. Learn. Res.
, vol.5
, pp. 361-397
-
-
Lewis, D.D.1
Yang, Y.2
Rose, T.G.3
Li, F.4
-
25
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM New York 10.1145/564691.564717
-
Hacigümüş, H.; Iyer, B.; Li, C.; Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data (SIGMOD '02), pp. 216-227. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data (SIGMOD '02)
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
26
-
-
85065578926
-
A privacy-preserving index for range queries
-
30 VLDB Endowment
-
Hore, B.; Mehrotra, S.; Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases (VLDB '04), vol. 30, pp. 720-731. VLDB Endowment,(2004)
-
(2004)
Proceedings of the Thirtieth International Conference on Very Large Data Bases (VLDB '04)
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
27
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
10.1007/s00778-011-0245-7
-
Hore, B.; Mehrotra, S.; Canim, M.; Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21, 333-358 (2012)
-
(2012)
VLDB J.
, vol.21
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
29
-
-
84870655838
-
-
Google trends (2012). http://www.google.com/trends/
-
(2012)
Google Trends
-
-
-
31
-
-
0002848777
-
Exploring the similarity space
-
32
-
Zobel, J.; Moffat, A.: Exploring the similarity space. In: SIGIR FORUM, vol. 32, pp. 18-34 (1998)
-
(1998)
SIGIR FORUM
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
|