-
1
-
-
84862563533
-
An SMDP-based service model for interdomain resource allocation in mobile cloud networks
-
Jun.
-
H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, "An SMDP-based service model for interdomain resource allocation in mobile cloud networks, " IEEE Trans. Veh. Technol., vol. 61, no. 5, pp. 2222-2232, Jun. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.5
, pp. 2222-2232
-
-
Liang, H.1
Cai, L.X.2
Huang, D.3
Shen, X.4
Peng, D.5
-
2
-
-
84865699114
-
A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks
-
Oct.
-
M. M. E. A. Mahmoud and X. Shen, "A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1805-1818, Oct. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.10
, pp. 1805-1818
-
-
Mahmoud, M.M.E.A.1
Shen, X.2
-
3
-
-
84896486238
-
Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation
-
Mar.
-
Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, "Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation, " IEEE J. Biomed. Health Inform., vol. 18, no. 2, pp. 430-439, Mar. 2014.
-
(2014)
IEEE J. Biomed. Health Inform.
, vol.18
, Issue.2
, pp. 430-439
-
-
Shen, Q.1
Liang, X.2
Shen, X.3
Lin, X.4
Luo, H.Y.5
-
4
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
Dec.
-
H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches, " Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, Dec. 2013.
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
5
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Berlin, Germany: Springer-Verlag
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing, " in Cloud Computing. Berlin, Germany: Springer-Verlag, 2009, pp. 157-166.
-
(2009)
Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
6
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, " in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur, 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur
, pp. 71-82
-
-
Sun, W.1
-
7
-
-
84904421834
-
Privacy-preservingmulti-keyword fuzzy search over encrypted data in the cloud
-
B. Wang, S. Yu, W. Lou, and Y T. Hou, "Privacy-preservingmulti-keyword fuzzy search over encrypted data in the cloud, " in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE INFOCOM, Apr./May
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
8
-
-
85173019558
-
Practical dynamic searchable encryption with small leakage
-
Feb.
-
E. Stefanov, C. Papamanthou, and E. Shi, "Practical dynamic searchable encryption with small leakage, " in Proc. NDSS, Feb. 2014.
-
(2014)
Proc. NDSS
-
-
Stefanov, E.1
Papamanthou, C.2
Shi, E.3
-
9
-
-
84928687796
-
Secure dynamic searchable symmetric encryption with constant document update cost
-
Y Yang, H. Li, W. Liu, H. Yang, and M. Wen, "Secure dynamic searchable symmetric encryption with constant document update cost, " in Proc. GLOBECOM, Anaheim, CA, USA, 2014.
-
(2014)
Proc. GLOBECOM, Anaheim, CA, USA
-
-
Yang, Y.1
Li, H.2
Liu, W.3
Yang, H.4
Wen, M.5
-
10
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for Boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries, " in Proc. CRYPTO, 2013, pp. 353-373.
-
(2013)
Proc. CRYPTO
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
11
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
12
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
W K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
13
-
-
84914140074
-
Dynamic searchable encryption via blind storage
-
M. Naveed, M. Prabhakaran, and C. A. Gunter, "Dynamic searchable encryption via blind storage, " in Proc. IEEE Symp. Secur. Privacy, May 2014, pp. 639-654.
-
(2014)
Proc. IEEE Symp. Secur. Privacy, May
, pp. 639-654
-
-
Naveed, M.1
Prabhakaran, M.2
Gunter, C.A.3
-
14
-
-
76849085704
-
Privacy-preserving similarity-based text retrieval
-
H. Pang, J. Shen, and R. Krishnan, "Privacy-preserving similarity-based text retrieval, " ACM Trans. Internet Technol., vol. 10, no. 1, p. 4, 2010.
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.1
, pp. 4
-
-
Pang, H.1
Shen, J.2
Krishnan, R.3
-
15
-
-
84897586040
-
Toward secure multikeyword top-k retrieval over encrypted cloud data
-
Jul./Aug.
-
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, "Toward secure multikeyword top-k retrieval over encrypted cloud data, " IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 239-250, Jul./Aug. 2013.
-
(2013)
IEEE Trans. Dependable Secure Comput.
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
-
16
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Berlin, Germany: Springer-Verlag
-
A. Lewko and B. Waters, "Decentralizing attribute-based encryption, " in Proc. EUROCRYPT. Berlin, Germany: Springer-Verlag, 2011, pp. 568-588.
-
(2011)
Proc. EUROCRYPT
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
17
-
-
85067714736
-
-
NSF Research Awards Abstracts 1990-2003. [Online] accessed 2004
-
NSF Research Awards Abstracts 1990-2003. [Online]. Available: http://kdd.ics.uci.edu/databases/nsfabs/nsfawards.html, accessed 2004.
-
-
-
-
18
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Proc. EUROCRYPT, 2004, pp. 506-522.
-
(2004)
Proc. EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
19
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Proc. TCC, 2007, pp. 535-554.
-
(2007)
Proc. TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
Jan.
-
B. Zhang and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search, " J. Netw. Comput. Appl., vol. 34, no. 1, pp. 262-267, Jan. 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
-
21
-
-
84861623252
-
Efficient information retrieval for ranked queries in cost-effective cloud environments
-
Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments, " in Proc. IEEE INFOCOM, Mar. 2012, pp. 2581-2585.
-
(2012)
Proc. IEEE INFOCOM, Mar.
, pp. 2581-2585
-
-
Liu, Q.1
Tan, C.C.2
Wu, J.3
Wang, G.4
-
22
-
-
84904444112
-
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
-
W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, " in Proc. IEEE INFOCOM, Apr./May 2014, pp. 226-234.
-
(2014)
Proc. IEEE INFOCOM, Apr./May
, pp. 226-234
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
23
-
-
84904410658
-
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
-
Q. Zheng, S. Xu, and G. Ateniese, "VABKS: Verifiable attribute-based keyword search over outsourced encrypted data, " in Proc. IEEE INFOCOM, Apr. 2014, pp. 522-530.
-
(2014)
Proc. IEEE INFOCOM, Apr.
, pp. 522-530
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
24
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE Symp. Secur. Privacy, May 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Secur. Privacy, May
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
25
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions, " in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur.
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
26
-
-
85178119595
-
Dynamic searchable encryption in very-large databases: Data structures and implementation
-
Feb.
-
D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation, " in Proc. NDSS, Feb. 2014.
-
(2014)
Proc. NDSS
-
-
Cash, D.1
-
27
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
28
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2010, pp. 253-262.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun.
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
29
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing, " in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM, Mar.
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
|