-
1
-
-
84861630522
-
Secure top-k query processing via untrusted location-based service providers
-
Mar.
-
R. Zhang, Y. Zhang, and C. Zhang, "Secure Top-k Query Processing via Untrusted Location-Based Service Providers," Proc. IEEE INFOCOM '12, Mar. 2012.
-
(2012)
Proc. IEEE INFOCOM '12
-
-
Zhang, R.1
Zhang, Y.2
Zhang, C.3
-
2
-
-
45749109010
-
Sybil guard: Defending against sybil attacks via social networks
-
June
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "Sybil Guard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
-
3
-
-
77953686613
-
Sybil limit: A near-optimal social network defense against sybil attacks
-
June
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "Sybil Limit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Networking, vol. 18, no. 3, pp. 885-898, June 2010.
-
(2010)
IEEE/ACM Trans. Networking
, vol.18
, Issue.3
, pp. 885-898
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
5
-
-
79961117005
-
Query integrity assurance of location-based services accessing outsourced spatial databases
-
July
-
W.-S. Ku, L. Hu, C. Shahabi, and H. Wang, "Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases," Proc. Int'l Symp. Advances in Spatial and Temporal Databases, July 2009.
-
(2009)
Proc. Int'l Symp. Advances in Spatial and Temporal Databases
-
-
Ku, W.-S.1
Hu, L.2
Shahabi, C.3
Wang, H.4
-
6
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over Encrypted Data in the Database-Service-Provider Model," Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD'02), pp. 216-227, 2002.
-
(2002)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD'02)
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
7
-
-
85065578926
-
A privacy-preserving index for range queries
-
Aug.
-
B. Hore, S. Mehrotra, and G. Tsudik, "A Privacy-Preserving Index for Range Queries," Proc. 30th Int'l Conf. Very Large Data Bases (VLDB'04), pp. 720-731, Aug. 2004.
-
(2004)
Proc. 30th Int'l Conf. Very Large Data Bases (VLDB'04)
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
8
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure Multidimensional Range Queries over Outsourced Data," The VLDB J., vol. 21, no. 3, pp. 333-358, 2012.
-
(2012)
The VLDB J.
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
9
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
May
-
E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig, "Multi-Dimensional Range Query over Encrypted Data," Proc. IEEE Symp. Security and Privacy (S&P'07), pp. 350-364, May 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy (S&P'07)
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
10
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
June
-
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS'11), June 2011.
-
(2011)
Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS'11)
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
11
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Apr.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, Apr. 2011.
-
(2011)
Proc. IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
12
-
-
77953310709
-
Achieving secure, scalable, and fine-grained access control in cloud computing
-
Mar.
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. IEEE INFOCOM'10, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM'10
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
13
-
-
40049111546
-
Verifying completeness of relational query answers from online servers
-
Mar.
-
H. Pang and K.-L. Tan, "Verifying Completeness of Relational Query Answers from Online Servers," ACM Trans. Information and System Security, vol. 11, no. 2, pp. 1-50, Mar. 2008.
-
(2008)
ACM Trans. Information and System Security
, vol.11
, Issue.2
, pp. 1-50
-
-
Pang, H.1
Tan, K.-L.2
-
15
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
H. Pang, J. Zhang, and K. Mouratidis, "Scalable Verification for Outsourced Dynamic Databases," Proc. VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
16
-
-
52649150749
-
Spatial outsourcing for location-mased services
-
Apr.
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, "Spatial Outsourcing for Location-Mased Services," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 1082-1091, Apr. 2008.
-
(2008)
Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE)
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
17
-
-
77952757469
-
Efficient verification of shortest path search via authenticated hints
-
Mar.
-
M. Yiu, Y. Lin, and K. Mouratidis, "Efficient Verification of Shortest Path Search via Authenticated Hints," Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE), pp. 237-248, Mar. 2010.
-
(2010)
Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE)
, pp. 237-248
-
-
Yiu, M.1
Lin, Y.2
Mouratidis, K.3
-
18
-
-
79957874657
-
Authentication of moving kNN queries
-
Apr.
-
M. Yiu, E. Lo, and D. Yung, "Authentication of Moving kNN Queries," Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE), pp. 565-576, Apr. 2011.
-
(2011)
Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE)
, pp. 565-576
-
-
Yiu, M.1
Lo, E.2
Yung, D.3
-
20
-
-
51349098378
-
Verifiable privacy-preserving range query in sensor networks
-
Apr.
-
B. Sheng and Q. Li, "Verifiable Privacy-Preserving Range Query in Sensor Networks," Proc. IEEE INFOCOM'08, pp. 46-50, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM'08
, pp. 46-50
-
-
Sheng, B.1
Li, Q.2
-
22
-
-
70450207961
-
Secure multidimensional range queries in sensor networks
-
May
-
R. Zhang, J. Shi, and Y. Zhang, "Secure Multidimensional Range Queries in Sensor Networks," Proc. ACM MobiHoc'09, pp. 197-206, May 2009.
-
(2009)
Proc. ACM MobiHoc'09
, pp. 197-206
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
-
23
-
-
77953310348
-
SafeQ: Secure and efficient query processing in sensor networks
-
Mar.
-
F. Chen and A. Liu, "SafeQ: Secure and Efficient Query Processing in Sensor Networks," Proc. IEEE INFOCOM'10, pp. 1-9, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM'10
, pp. 1-9
-
-
Chen, F.1
Liu, A.2
-
24
-
-
77953304573
-
Verifiable fine-grained top-K queries in tiered sensor networks
-
Mar.
-
R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable Fine-Grained Top-K Queries in Tiered Sensor Networks," Proc. IEEE INFOCOM'10, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM'10
-
-
Zhang, R.1
Shi, J.2
Liu, Y.3
Zhang, Y.4
|