-
2
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure kNN Computation on Encrypted Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2009.
-
(2009)
Proc. ACM SIGMOD Int'l Conf. Management of Data
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
3
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi, "Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism," Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE), 2011.
-
(2011)
Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE)
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
4
-
-
84891790992
-
Building confidential and efficient query services in the cloud with rasp data perturbation
-
Feb.
-
H. Xu, S. Guo, and K. Chen, "Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation," IEEE Trans. Knowledge and Data Eng., vol. 26, no. 2, pp. 322-335, Feb. 2014.
-
(2014)
IEEE Trans. Knowledge and Data Eng.
, vol.26
, Issue.2
, pp. 322-335
-
-
Xu, H.1
Guo, S.2
Chen, K.3
-
7
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD Int'l Conf. Management, 2008.
-
(2008)
Proc. ACM SIGMOD Int'l Conf. Management
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
8
-
-
84455187876
-
A hybrid technique for private location-based queries with database protection
-
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "A Hybrid Technique for Private Location-Based Queries with Database Protection," Proc. Advances in Spatial and Temporal Databases, 2009.
-
(2009)
Proc. Advances in Spatial and Temporal Databases
-
-
Ghinita, G.1
Kalnis, P.2
Kantarcioglu, M.3
Bertino, E.4
-
9
-
-
80052963407
-
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection
-
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "Approximate and Exact Hybrid Algorithms for Private Nearest-Neighbor Queries with Database Protection," J. Geoinformatica, vol. 15, pp. 699-726, 2011.
-
(2011)
J. Geoinformatica
, vol.15
, pp. 699-726
-
-
Ghinita, G.1
Kalnis, P.2
Kantarcioglu, M.3
Bertino, E.4
-
11
-
-
67650690965
-
Order preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order Preserving Symmetric Encryption," Proc. 28th Ann. Int'l Conf. Advances in Cryptology: The Theory and Applications of Cryptographic Techniques (EuroCrypt'09), 2009.
-
(2009)
Proc. 28th Ann. Int'l Conf. Advances in Cryptology: The Theory and Applications of Cryptographic Techniques (EuroCrypt'09)
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'neill, A.4
-
13
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
J. Louis and L. Bentley, "Multidimensional Binary Search Trees Used for Associative Searching," ACM Comm., vol. 18, pp. 509-517, 1975.
-
(1975)
ACM Comm.
, vol.18
, pp. 509-517
-
-
Louis, J.1
Bentley, L.2
-
14
-
-
38248999372
-
Voronoi diagrams oover dynamic scenes
-
R. Thomas, "Voronoi Diagrams Oover Dynamic Scenes," Discrete Applied Math., vol. 43, pp. 243-259, 1993.
-
(1993)
Discrete Applied Math.
, vol.43
, pp. 243-259
-
-
Thomas, R.1
-
15
-
-
84923203583
-
-
http://www.qhull.org/, 2014.
-
(2014)
-
-
-
19
-
-
35648982949
-
Preserving location-based identity inference in anonymous spatial queries
-
Dec.
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preserving Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 12, pp. 1719-1733, Dec. 2007.
-
(2007)
IEEE Trans. Knowledge and Data Eng.
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
20
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order Preserving Encryption for Numeric Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2004.
-
(2004)
Proc. ACM SIGMOD Int'l Conf. Management of Data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
21
-
-
0020141081
-
On k-nearest neighbor voronoi diagrams in the plane
-
June
-
D.-T. Lee, "On k-Nearest Neighbor Voronoi Diagrams in the Plane," IEEE Trans. Computers, vol. C-31, no. 6, pp. 478-487, June 1982.
-
(1982)
IEEE Trans. Computers
, vol.C-31
, Issue.6
, pp. 478-487
-
-
Lee, D.-T.1
-
22
-
-
0001698164
-
Constructing levels in arrangements and higher order voronoi diagrams
-
P.K. Agarwal, M. De Berg, J. Matousek, and O. Schwarzkopf, "Constructing Levels in Arrangements and Higher Order Voronoi Diagrams," SIAM J. Computing, vol. 27, pp. 654-667, 1998.
-
(1998)
SIAM J. Computing
, vol.27
, pp. 654-667
-
-
Agarwal, P.K.1
De Berg, M.2
Matousek, J.3
Schwarzkopf, O.4
|