-
1
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, "Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking," in Proc. ACM ASIACCS, 2013, pp. 71-82.
-
(2013)
Proc. ACM ASIACCS
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
6
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
7
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu,C.Wang, K. Ren, andW. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
8
-
-
0003756969
-
-
San Francisco, CA, USA: Morgan Kaufmann May
-
I.H. Witten, A. Moffat, and T.C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images. San Francisco, CA, USA: Morgan Kaufmann, May 1999.
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
9
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling Secure and Efficient Ranked Keyword Search Over Outsourced Cloud Data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
10
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, "Confidentiality-Preserving Rank-Ordered Search," in Proc. ACM Workshop Storage Security Survivability, 2007, pp. 7-12.
-
(2007)
Proc. ACM Workshop Storage Security Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
11
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k Retrieval from a Confidential Index," in Proc. EDBT, 2009, pp. 439-449.
-
(2009)
Proc. EDBT
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
12
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," in Proc. EUROCRYPT, 2004, pp. 506-522.
-
(2004)
Proc. EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
13
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B.R. Waters, "Secure Conjunctive Keyword Search Over Encrypted Data," in Proc. ACNS, 2004, pp. 31-45.
-
(2004)
Proc. ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
14
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," in Proc. TCC, 2007, pp. 535-554.
-
(2007)
Proc. TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
15
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee, "Public Key Encryption with Conjunctive Keyword Search and its Extension to a Multi-User System," in Proc. Pairing, 2007, pp. 2-22.
-
(2007)
Proc. Pairing
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
16
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," in Proc. IEEE S P, 2000, pp. 44-55.
-
(2000)
Proc. IEEE S P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
17
-
-
33244488406
-
Secure indexes
-
[Online]. Available
-
E.-J. Goh, "Secure Indexes," in Cryptology ePrint Archive 2003. [Online]. Available: http://eprint.iacr.org/2003/216.
-
(2003)
Cryptology EPrint Archive
-
-
Goh, E.-J.1
-
18
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," in Proc. ACNS, 2005, pp. 391-421.
-
(2005)
Proc. ACNS
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
19
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," in Proc. ACM CCS, 2006, pp. 79-88.
-
(2006)
Proc. ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
20
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
P. Liesdonk, S. Sedghi, J. Doumen, P. Hartel, and W. Jonker, "Computationally Efficient Searchable Symmetric Encryption," in Proc. Secure Data Manage., 2010, pp. 87-100.
-
(2010)
Proc. Secure Data Manage.
, pp. 87-100
-
-
Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
21
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang,M. Li, K. Ren, andW. Lou, "Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data," in Proc. IEEE INFOCOM, 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
22
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B.Waters, "Predicate Privacy in Encryption Systems," in Proc. TCC, 2009, pp. 457-473.
-
(2009)
Proc. TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
23
-
-
84925827178
-
Privacy-preserving logarithmic-time search on encrypted data in cloud
-
Y. Lu, "Privacy-Preserving Logarithmic-Time Search on Encrypted Data In Cloud," in Proc. NDSS, 2012, pp. 1-17.
-
(2012)
Proc. NDSS
, pp. 1-17
-
-
Lu, Y.1
-
24
-
-
76849085704
-
Privacy-preserving similarity-based text retrieval
-
Feb.
-
H. Pang, J. Shen, and R. Krishnan, "Privacy-Preserving Similarity-Based Text Retrieval," ACM Trans. Internet Technol., vol. 10, no. 1, p. 4, Feb. 2010.
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.1
, pp. 4
-
-
Pang, H.1
Shen, J.2
Krishnan, R.3
-
25
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic Authenticated Index Structures for Outsourced Databases," in Proc. SIGMOD, 2013, pp. 121-132.
-
(2013)
Proc. SIGMOD
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
26
-
-
2442590644
-
Authenticating query results in edge computing
-
H. Pang and K.-L. Tan, "Authenticating Query Results in Edge Computing," in Proc. ICDE, 2004, pp. 560-571.
-
(2004)
Proc. ICDE
, pp. 560-571
-
-
Pang, H.1
Tan, K.-L.2
-
27
-
-
76849102606
-
Authenticating the query results of text search engines
-
Aug.
-
H. Pang and K.Mouratidis, "Authenticating the Query Results of Text Search Engines," Proc. VLDB Endowment, vol. 1, no. 1, pp. 126-137, Aug. 2008.
-
(2008)
Proc. VLDB Endowment
, vol.1
, Issue.1
, pp. 126-137
-
-
Pang, H.1
Mouratidis, K.2
-
28
-
-
54249111543
-
Extending fagin's algorithm for more users based on multidimensional B-tree
-
M. Ondreicka and J. Pokorný , "Extending Fagin's Algorithm for More Users Based on Multidimensional B-Tree," in Proc. ADBIS, 2008, pp. 199-214.
-
(2008)
Proc. ADBIS
, pp. 199-214
-
-
Ondreicka, M.1
Pokorný, J.2
-
29
-
-
0032201622
-
Private information retrieval
-
Nov.
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private Information Retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, Nov. 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
30
-
-
0020277962
-
Multidimensional b-trees for associative searching in database systems
-
P. Scheuermann and M. Ouksel, "Multidimensional B-Trees for Associative Searching in Database Systems," Inf. Syst., vol. 7, no. 2, pp. 123-137, 1982.
-
(1982)
Inf. Syst.
, vol.7
, Issue.2
, pp. 123-137
-
-
Scheuermann, P.1
Ouksel, M.2
-
31
-
-
70849131456
-
Secure KNN computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure KNN Computation on Encrypted Databases," in Proc. SIGMOD, 2009, pp. 139-152.
-
(2009)
Proc. SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
32
-
-
84881354487
-
Secure nearest neighbor revisited
-
B. Yao, F. Li, and X. Xiao, "Secure Nearest Neighbor Revisited," in Proc. ICDE, 2013, pp. 733-744.
-
(2013)
Proc. ICDE
, pp. 733-744
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
34
-
-
0018480749
-
Ubiquitous B-tree
-
June
-
D. Comer, "Ubiquitous B-Tree," ACM Comput. Surveys, vol. 11, no. 2, pp. 121-137, June 1979.
-
(1979)
ACM Comput. Surveys
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
35
-
-
84877944290
-
-
[Online]. Available
-
Keyword and Search Engines Statistics. 2013. [Online]. Available: http://www.keyworddiscovery.com/keyword-stats.html?date= 2013-01-01.
-
(2013)
Keyword and Search Engines Statistics
-
-
|