-
1
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Apr.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, pp. 829-837, Apr, 2011.
-
(2011)
Proc. IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
2
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2009.
-
(2009)
ACM SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
3
-
-
84861630520
-
LT codes-based secure and reliable cloud storage service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, "LT Codes-Based Secure and Reliable Cloud Storage Service," Proc. IEEE INFOCOM, pp. 693-701, 2012.
-
(2012)
Proc. IEEE INFOCOM
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.5
-
5
-
-
0344756842
-
Modern information retrieval: A brief overview
-
Mar.
-
A. Singhal, "Modern Information Retrieval: A Brief Overview," IEEE Data Eng. Bull., vol. 24, no. 4, pp. 35-43, Mar. 2001.
-
(2001)
IEEE Data Eng. Bull.
, vol.24
, Issue.4
, pp. 35-43
-
-
Singhal, A.1
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), 2006.
-
(2006)
Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06)
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
17444370055
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004.
-
(2004)
Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT)
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
13
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous Ibe, and Extensions," J. Cryptology, vol. 21, no. 3, pp. 350-391, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
14
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
Mar.
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search Over Encrypted Data in Cloud Computing," Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
16
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," Proc. Applied Cryptography and Network Security, pp. 31-45, 2004.
-
(2004)
Proc. Applied Cryptography and Network Security
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
18
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," Proc. Fourth Conf. Theory Cryptography (TCC), pp. 535-554, 2007.
-
(2007)
Proc. Fourth Conf. Theory Cryptography (TCC)
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System," Pairing, vol. 4575, pp. 2-22, 2007.
-
(2007)
Pairing
, vol.4575
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
21
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products," Proc. 27th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008.
-
(2008)
Proc. 27th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT)
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
77957002082
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption," Proc. 29th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '10), 2010.
-
(2010)
Proc. 29th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '10)
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
24
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
June
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized Private Keyword Search over Encrypted Data in Cloud Computing," Proc. 31st Int'l Conf. Distributed Computing Systems (ICDCS '10), pp. 383-392, June 2011.
-
(2011)
Proc. 31st Int'l Conf. Distributed Computing Systems (ICDCS '10)
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
25
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS '10), 2010.
-
(2010)
Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS '10)
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
26
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
27
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure kNN Computation on Encrypted Databases," Proc. 35th ACM SIGMOD Int'l Conf. Management of Data (SIGMOD), pp. 139-152, 2009.
-
(2009)
Proc. 35th ACM SIGMOD Int'l Conf. Management of Data (SIGMOD)
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
28
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
29
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
30
-
-
43349086436
-
Zerber: R-confidential indexing for distributed documents
-
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, "Zerber: r-Confidential Indexing for Distributed Documents," Proc. 11th Int'l Conf. Extending Database Technology (EDBT '08), pp. 287-298, 2008.
-
(2008)
Proc. 11th Int'l Conf. Extending Database Technology (EDBT '08)
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
-
31
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k Retrieval from a Confidential Index," Proc. 12th Int'l Conf. Extending Database Technology (EDBT '09), pp. 439-449, 2009.
-
(2009)
Proc. 12th Int'l Conf. Extending Database Technology (EDBT '09)
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
32
-
-
38049021884
-
Cryptography from anonymity
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Cryptography from Anonymity," Proc. IEEE 47th Ann. Symp. Foundations of CS, pp. 239-248, 2006.
-
(2006)
Proc. IEEE 47th Ann. Symp. Foundations of CS
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
33
-
-
0002848777
-
Exploring the similarity space
-
J. Zobel and A. Moffat, "Exploring the Similarity Space," ACM SIGIR Forum, vol. 32, pp. 18-34, 1998.
-
(1998)
ACM SIGIR Forum
, vol.32
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
-
34
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Apr.-June
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
-
(2012)
IEEE Trans. Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
36
-
-
80051914330
-
Privacypreserving query over encrypted graph-structured data in cloud computing
-
June
-
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou, "Privacypreserving Query over Encrypted Graph-Structured Data in Cloud Computing," Proc. Distributed Computing Systems (ICDCS), pp. 393-402, June, 2011.
-
(2011)
Proc. Distributed Computing Systems (ICDCS)
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
|