-
2
-
-
84870639734
-
-
Microsoft Azure, 2015, http://www.windowsazure.com.
-
(2015)
Microsoft Azure
-
-
-
3
-
-
84930343692
-
-
Apple iCloud, 2015, https://www.icloud.com/
-
(2015)
Apple ICloud
-
-
-
4
-
-
84930358954
-
-
Google AppEngine, 2015, https://appengine.google.com/
-
(2015)
Google AppEngine
-
-
-
5
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA May
-
Dawn Xiaodong Song, David Wagner and Adrian Perrig, Practical Techniques for Searches on Encrypted Data, Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, May, 2000, pp.44-55.
-
(2000)
Proc. of IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Xiaodong Song, D.1
Wagner, D.2
Perrig, A.3
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexandria October
-
Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky, Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, October, 2006, pp.79-88.
-
(2006)
Proc. of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Genoa, Italy June
-
Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, Secure Ranked Keyword Search over Encrypted Cloud Data, Proc. of the 30th IEEE International Conference on Distributed Computing System, Genoa, Italy, June, 2010, pp.253-262.
-
(2010)
Proc. of the 30th IEEE International Conference on Distributed Computing System
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Ning Cao, Cong Wang, Li Ming, Kui Ren and Wenjing Lou, Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.1, 2014, pp.222-233.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Ming, L.3
Ren, K.4
Lou, W.5
-
11
-
-
84877939257
-
Privacy- preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
Hangzhou, China May
-
Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, Privacy- Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-Based Ranking, Proc. of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, May, 2013, pp.71-82.
-
(2013)
Proc. of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Thomas Hou, Y.6
Li, H.7
-
12
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, March
-
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren and Wenjing Lou, Fuzzy Keyword Search over Encrypted Data in Cloud Computing, Proc. of IEEE INFOCOM 2010, San Diego, CA, March, 2010, pp.1-5.
-
(2010)
Proc. of IEEE INFOCOM 2010
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
13
-
-
84864234736
-
Efficient similarity search over encrypted data
-
Washington, DC April
-
Mehmet Kuzu, Mohammad Saiful Islam and Murat Kantarcioglu, Efficient Similarity Search over Encrypted Data, Proc. of the 28th IEEE International Conference on Data Engineering, Washington, DC, April, 2012, pp.1156-1167.
-
(2012)
Proc. of the 28th IEEE International Conference on Data Engineering
, pp. 1156-1167
-
-
Kuzu, M.1
Saiful Islam, M.2
Kantarcioglu, M.3
-
14
-
-
84902815285
-
Semantic keyword search based on trie over encrypted cloud data
-
Kyoto, Japan June
-
Zhangjie Fu, Jiangang Shu, Xingming Sun and Daxing Zhang, Semantic Keyword Search Based on Trie over Encrypted Cloud Data, Proc. of the 2nd International Workshop on Security in Cloud Computing, Kyoto, Japan, June, 2014, pp.59-62.
-
(2014)
Proc. of the 2nd International Workshop on Security in Cloud Computing
, pp. 59-62
-
-
Fu, Z.1
Shu, J.2
Sun, X.3
Zhang, D.4
-
15
-
-
84881336745
-
Preferred keyword search over encrypted data in cloud computing
-
Montreal, Canada June
-
Zhirong Shen, Jiwu Shu and Wei Xue, Preferred Keyword Search over Encrypted Data in Cloud Computing, Proc. of the 21st IEEE/ACM International Symposium on Quality of Service, Montreal, Canada, June, 2013, pp.1-6.
-
(2013)
Proc. of the 21st IEEE/ACM International Symposium on Quality of Service
, pp. 1-6
-
-
Shen, Z.1
Shu, J.2
Xue, W.3
-
16
-
-
70849131456
-
Secure knn computation on encrypted databases
-
Providence, RI, June
-
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao and Nikos Mamoulis, Secure kNN Computation on Encrypted Databases, Proc. of the 2009 ACM SIGMOD International Conference on Management of Data, Providence, RI, June, 2009, pp.139-152.
-
(2009)
Proc. of the 2009 ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
17
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
Dallas, TX May
-
Piotr Indyk and Rajeev Motwani, Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality, Proc. of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, May, 1998, pp.604-613.
-
(1998)
Proc. of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
18
-
-
84955245129
-
Multi-probe LSH: Efficient indexing for high-dimensional similarity search
-
Vienna, Austria September
-
Qin Lv, William Josephsona, Zhe Wang, Moses Charikar and Kai Li, Multi-probe LSH: Efficient Indexing for High-Dimensional Similarity Search, Proc. of the 33rd International Conference on Very Large Data Bases, Vienna, Austria, September, 2007, pp.950-961.
-
(2007)
Proc. of the 33rd International Conference on Very Large Data Bases
, pp. 950-961
-
-
Lv, Q.1
Josephsona, W.2
Wang, Z.3
Charikar, M.4
Li, K.5
-
19
-
-
0036040277
-
Similarity estimation techniques from rounding algorithms
-
Montreal, Canada May
-
Moses S. Charikar, Similarity Estimation Techniques from Rounding Algorithms, Proc. of the Thiry-Fourth Annual ACM Symposium on Theory of Computing, Montreal, Canada, May, 2002, pp.380-388.
-
(2002)
Proc. of the Thiry-Fourth Annual ACM Symposium on Theory of Computing
, pp. 380-388
-
-
Charikar, M.S.1
-
20
-
-
35348911985
-
A detecting near-duplicates for web crawling
-
Banff, Canada May
-
Gurmeet Singh Manku, Arvind Jain and Anish Das Sarma, A Detecting Near-Duplicates for Web Crawling, Proc. of the 16th International Conference on World Wide Web, Banff, Canada, May, 2007, pp.141-150.
-
(2007)
Proc. of the 16th International Conference on World Wide Web
, pp. 141-150
-
-
Singh Manku, G.1
Jain, A.2
Das Sarma, A.3
-
22
-
-
84948481845
-
An algorithm for suffix stripping
-
Martin F. Porter, An Algorithm for Suffix Stripping, Program, Vol.14, No.3, 1980, pp.130-137.
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
23
-
-
84901497531
-
A fast matching method based on semantic similarity for short texts
-
Chongqing, China, November
-
Jiaming Xu, Pengcheng Liu, Gaowei Wu, Zhengya Sun, Bo Xu and Hongwei Hao, A Fast Matching Method Based on Semantic Similarity for Short Texts, Proc. of NLPCC 2013, Chongqing, China, November, 2013, pp.299-309.
-
(2013)
Proc. of NLPCC 2013
, pp. 299-309
-
-
Xu, J.1
Liu, P.2
Wu, G.3
Sun, Z.4
Xu, B.5
Hao, H.6
-
24
-
-
84926687632
-
Proof of ownership in deduplicated cloud storage with mobile device efficiency
-
Chia-Mu Yu, Chi-Yuan Chen and Han-Chieh Chao, Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency, IEEE Network, Vol.29, No.2, 2015, pp.51-55.
-
(2015)
IEEE Network
, vol.29
, Issue.2
, pp. 51-55
-
-
Yu, C.-M.1
Chen, C.-Y.2
Chao, H.-C.3
-
25
-
-
84922280902
-
Segmentation-based image copy-move forgery detection scheme
-
Jian Li, Xiaolong Li, Bin Yang and Xingming Sun, Segmentation-Based Image Copy-Move Forgery Detection Scheme, IEEE Transactions on Information Forensics and Security, Vol.10, No.3, 2015, pp.507-518.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.3
, pp. 507-518
-
-
Li, J.1
Li, X.2
Yang, B.3
Sun, X.4
-
26
-
-
84896405853
-
Synthetic aperture radar image segmentation by modified student's t-mixture model
-
Hui Zhang, Q. M. Jonathan Wu, Thanh Minh Nguyen and Xingmin Sun, Synthetic Aperture Radar Image Segmentation by Modified Student's t-Mixture Model, IEEE Transaction on Geoscience and Remote Sensing, Vol.52, No.7, 2014, pp.4391-4403.
-
(2014)
IEEE Transaction on Geoscience and Remote Sensing
, vol.52
, Issue.7
, pp. 4391-4403
-
-
Zhang, H.1
Jonathan Wu, Q.M.2
Minh Nguyen, T.3
Sun, X.4
-
27
-
-
84880921984
-
Feasibility and finite convergence analysis for accurate on-line ?-support vector learning
-
Bin Gu and Victor S. Sheng, Feasibility and Finite Convergence Analysis for Accurate On-Line ?-Support Vector Learning, IEEE Transactions on Neural Networks and Learning Systems, Vol.24, No.8, 2013, pp.1304-1315.
-
(2013)
IEEE Transactions on Neural Networks and Learning Systems
, vol.24
, Issue.8
, pp. 1304-1315
-
-
Gu, B.1
Sheng, V.S.2
|