메뉴 건너뛰기




Volumn 12, Issue 1, 2015, Pages 111-124

Secure spatial top-k query processing via untrusted location-based service providers

Author keywords

location based service; security; Spatial top k query

Indexed keywords

INFORMATION RETRIEVAL; LOCATION; TELECOMMUNICATION SERVICES;

EID: 84921351436     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2309133     Document Type: Article
Times cited : (29)

References (25)
  • 1
    • 84861630522 scopus 로고    scopus 로고
    • Secure top-k query processing via untrusted location-based service providers
    • Mar.
    • R. Zhang, Y. Zhang, and C. Zhang, "Secure Top-k Query Processing via Untrusted Location-Based Service Providers," Proc. IEEE INFOCOM '12, Mar. 2012.
    • (2012) Proc. IEEE INFOCOM '12
    • Zhang, R.1    Zhang, Y.2    Zhang, C.3
  • 2
    • 45749109010 scopus 로고    scopus 로고
    • Sybil guard: Defending against sybil attacks via social networks
    • June
    • H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "Sybil Guard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
    • (2008) IEEE/ACM Trans. Networking , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4
  • 3
    • 77953686613 scopus 로고    scopus 로고
    • Sybil limit: A near-optimal social network defense against sybil attacks
    • June
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "Sybil Limit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Networking, vol. 18, no. 3, pp. 885-898, June 2010.
    • (2010) IEEE/ACM Trans. Networking , vol.18 , Issue.3 , pp. 885-898
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 8
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure Multidimensional Range Queries over Outsourced Data," The VLDB J., vol. 21, no. 3, pp. 333-358, 2012.
    • (2012) The VLDB J. , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 11
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Apr.
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, Apr. 2011.
    • (2011) Proc. IEEE INFOCOM
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 12
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained access control in cloud computing
    • Mar.
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. IEEE INFOCOM'10, Mar. 2010.
    • (2010) Proc. IEEE INFOCOM'10
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 13
    • 40049111546 scopus 로고    scopus 로고
    • Verifying completeness of relational query answers from online servers
    • Mar.
    • H. Pang and K.-L. Tan, "Verifying Completeness of Relational Query Answers from Online Servers," ACM Trans. Information and System Security, vol. 11, no. 2, pp. 1-50, Mar. 2008.
    • (2008) ACM Trans. Information and System Security , vol.11 , Issue.2 , pp. 1-50
    • Pang, H.1    Tan, K.-L.2
  • 15
    • 77952757644 scopus 로고    scopus 로고
    • Scalable verification for outsourced dynamic databases
    • H. Pang, J. Zhang, and K. Mouratidis, "Scalable Verification for Outsourced Dynamic Databases," Proc. VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , Issue.1 , pp. 802-813
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 17
  • 20
    • 51349098378 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in sensor networks
    • Apr.
    • B. Sheng and Q. Li, "Verifiable Privacy-Preserving Range Query in Sensor Networks," Proc. IEEE INFOCOM'08, pp. 46-50, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM'08 , pp. 46-50
    • Sheng, B.1    Li, Q.2
  • 21
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • Apr.
    • J. Shi, R. Zhang, and Y. Zhang, "Secure Range Queries in Tiered Sensor Networks," Proc. IEEE INFOCOM'09, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM'09
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 22
    • 70450207961 scopus 로고    scopus 로고
    • Secure multidimensional range queries in sensor networks
    • May
    • R. Zhang, J. Shi, and Y. Zhang, "Secure Multidimensional Range Queries in Sensor Networks," Proc. ACM MobiHoc'09, pp. 197-206, May 2009.
    • (2009) Proc. ACM MobiHoc'09 , pp. 197-206
    • Zhang, R.1    Shi, J.2    Zhang, Y.3
  • 23
    • 77953310348 scopus 로고    scopus 로고
    • SafeQ: Secure and efficient query processing in sensor networks
    • Mar.
    • F. Chen and A. Liu, "SafeQ: Secure and Efficient Query Processing in Sensor Networks," Proc. IEEE INFOCOM'10, pp. 1-9, Mar. 2010.
    • (2010) Proc. IEEE INFOCOM'10 , pp. 1-9
    • Chen, F.1    Liu, A.2
  • 24
    • 77953304573 scopus 로고    scopus 로고
    • Verifiable fine-grained top-K queries in tiered sensor networks
    • Mar.
    • R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable Fine-Grained Top-K Queries in Tiered Sensor Networks," Proc. IEEE INFOCOM'10, Mar. 2010.
    • (2010) Proc. IEEE INFOCOM'10
    • Zhang, R.1    Shi, J.2    Liu, Y.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.