-
1
-
-
84877359020
-
Novel approaches in query processing for moving object trajectories
-
D. Pfoser, C. S. Jensen, and Y. Theodoridis, "Novel approaches in query processing for moving object trajectories," in VLDB, 2000, pp. 395-406.
-
(2000)
VLDB
, pp. 395-406
-
-
Pfoser, D.1
Jensen, C.S.2
Theodoridis, Y.3
-
2
-
-
77952758709
-
Trajstore: An adaptive storage system for very large trajectory data sets
-
P. Cudré-Mauroux, E. Wu, and S. Madden, "Trajstore: An adaptive storage system for very large trajectory data sets," in ICDE, 2010, pp. 109-120.
-
(2010)
ICDE
, pp. 109-120
-
-
Cudré-Mauroux, P.1
Wu, E.2
Madden, S.3
-
3
-
-
84880549017
-
Calibrating trajectory data for similarity-based analysis
-
H. Su, K. Zheng, H. Wang, J. Huang, and X. Zhou, "Calibrating trajectory data for similarity-based analysis," in SIGMOD, 2013, pp. 833-844.
-
(2013)
SIGMOD
, pp. 833-844
-
-
Su, H.1
Zheng, K.2
Wang, H.3
Huang, J.4
Zhou, X.5
-
4
-
-
84863245385
-
Privacy of spatial trajectories
-
Y. Zheng and X. Zhou, Eds. Springer New York
-
C.-Y. Chow and M. Mokbel, "Privacy of spatial trajectories," in Computing with Spatial Trajectories, Y. Zheng and X. Zhou, Eds. Springer New York, 2011, pp. 109-141.
-
(2011)
Computing with Spatial Trajectories
, pp. 109-141
-
-
Chow, C.-Y.1
Mokbel, M.2
-
5
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, "Executing sql over encrypted data in the database-service-provider model," in SIGMOD, 2002, pp. 216-227.
-
(2002)
SIGMOD
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
6
-
-
84904311414
-
Secure query processing with data interoperability in a cloud database environment
-
W. K. Wong, B. Kao, D. W.-L. Cheung, R. Li, and S.-M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in SIGMOD, 2014, pp. 1395-1406.
-
(2014)
SIGMOD
, pp. 1395-1406
-
-
Wong, W.K.1
Kao, B.2
Cheung, D.W.-L.3
Li, R.4
Yiu, S.-M.5
-
7
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
H. Hacigümüs, B. R. Iyer, and S. Mehrotra, "Efficient execution of aggregation queries over encrypted relational databases," in DASFAA, 2004, pp. 125-136.
-
(2004)
DASFAA
, pp. 125-136
-
-
Hacigümüs, H.1
Iyer, B.R.2
Mehrotra, S.3
-
8
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," VLDB J., vol. 21, no. 3, pp. 333-358, 2012.
-
(2012)
VLDB J.
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
9
-
-
84881329100
-
Secure and efficient range queries on outsourced databases using rp-trees
-
P. Wang and C. V. Ravishankar, "Secure and efficient range queries on outsourced databases using rp-trees," in ICDE, 2013, pp. 314-325.
-
(2013)
ICDE
, pp. 314-325
-
-
Wang, P.1
Ravishankar, C.V.2
-
10
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in SIGMOD, 2009, pp. 139-152.
-
(2009)
SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
11
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," in ICDE, 2011, pp. 601-612.
-
(2011)
ICDE
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
12
-
-
84881354487
-
Secure nearest neighbor revisited
-
B. Yao, F. Li, and X. Xiao, "Secure nearest neighbor revisited," in ICDE, 2013, pp. 733-744.
-
(2013)
ICDE
, pp. 733-744
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
13
-
-
84901750940
-
Secure k-nearest neighbor query over encrypted data in outsourced environment
-
Y. Elmehdwi, B. K. Samanthula, and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environment," in ICDE, 2014, pp. 664-675.
-
(2014)
ICDE
, pp. 664-675
-
-
Elmehdwi, Y.1
Samanthula, B.K.2
Jiang, W.3
-
14
-
-
84870520150
-
Trajectory indexing and retrieval
-
Y. Zheng and X. Zhou, Eds. Springer New York
-
K. Deng, K. Xie, K. Zheng, and X. Zhou, "Trajectory indexing and retrieval," in Computing with Spatial Trajectories, Y. Zheng and X. Zhou, Eds. Springer New York, 2011, pp. 35-60.
-
(2011)
Computing with Spatial Trajectories
, pp. 35-60
-
-
Deng, K.1
Xie, K.2
Zheng, K.3
Zhou, X.4
-
15
-
-
0242497349
-
Exact indexing of dynamic time warping
-
E. J. Keogh, "Exact indexing of dynamic time warping," in VLDB, 2002, pp. 406-417.
-
(2002)
VLDB
, pp. 406-417
-
-
Keogh, E.J.1
-
16
-
-
0036211177
-
Discovering similar multidimensional trajectories
-
M. Vlachos, D. Gunopulos, and G. Kollios, "Discovering similar multidimensional trajectories," in ICDE, 2002, pp. 673-684.
-
(2002)
ICDE
, pp. 673-684
-
-
Vlachos, M.1
Gunopulos, D.2
Kollios, G.3
-
17
-
-
29844444110
-
Robust and fast similarity search for moving object trajectories
-
L. Chen, M. T. Ö zsu, and V. Oria, "Robust and fast similarity search for moving object trajectories," in SIGMOD, 2005, pp. 491-502.
-
(2005)
SIGMOD
, pp. 491-502
-
-
Chen, L.1
Ozsu, M.T.2
Oria, V.3
-
18
-
-
85014376145
-
Privacy preserving similarity evaluation of time series data
-
H. Zhu, X. Meng, and G. Kollios, "Privacy preserving similarity evaluation of time series data," in EDBT, 2014, pp. 499-510.
-
(2014)
EDBT
, pp. 499-510
-
-
Zhu, H.1
Meng, X.2
Kollios, G.3
-
19
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao, "How to generate and exchange secrets," in FOCS, 1986, pp. 162-167.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
64249101946
-
A proof of security of yao's protocol for twoparty computation
-
Y. Lindell and B. Pinkas, "A proof of security of yao's protocol for twoparty computation," J. Cryptology, vol. 22, no. 2, pp. 161-188, 2009.
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
23
-
-
80053596395
-
Twin clouds: Secure cloud computing with low latency
-
S. Bugiel, S. Nürnberger, A.-R. Sadeghi, and T. Schneider, "Twin clouds: Secure cloud computing with low latency," in CMS, 2011, pp. 32-44.
-
(2011)
CMS
, pp. 32-44
-
-
Bugiel, S.1
Nürnberger, S.2
Sadeghi, A.-R.3
Schneider, T.4
-
24
-
-
84901748695
-
Private search on key-value stores with hierarchical indexes
-
H. Hu, J. Xu, X. Xu, K. Pei, B. Choi, and S. Zhou, "Private search on key-value stores with hierarchical indexes," in ICDE, 2014, pp. 628-639.
-
(2014)
ICDE
, pp. 628-639
-
-
Hu, H.1
Xu, J.2
Xu, X.3
Pei, K.4
Choi, B.5
Zhou, S.6
-
25
-
-
49049099825
-
Improved garbled circuit: Free xor gates and applications
-
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free xor gates and applications," in ICALP, 2008, pp. 486-498.
-
(2008)
ICALP
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
27
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
28
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
J. Domingo-Ferrer, "A provably secure additive and multiplicative privacy homomorphism," in ISC, 2002, pp. 471-483.
-
(2002)
ISC
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
29
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC, 2009, pp. 169-178.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
30
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects databases
-
O. Abul, F. Bonchi, and M. Nanni, "Never walk alone: Uncertainty for anonymity in moving objects databases," in ICDE, 2008, pp. 376-385.
-
(2008)
ICDE
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
31
-
-
73949100139
-
Towards trajectory anonymization: A generalization-based approach
-
M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç, "Towards trajectory anonymization: a generalization-based approach," Transactions on Data Privacy, vol. 2, no. 1, pp. 47-75, 2009.
-
(2009)
Transactions on Data Privacy
, vol.2
, Issue.1
, pp. 47-75
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
Güç, B.4
-
32
-
-
84869463688
-
Differentially private trajectory data publication
-
abs/1112. 2020
-
R. Chen, B. C. M. Fung, and B. C. Desai, "Differentially private trajectory data publication," CoRR, vol. Abs/1112. 2020, 2011.
-
(2011)
CoRR
-
-
Chen, R.1
Fung, B.C.M.2
Desai, B.C.3
-
33
-
-
84884388019
-
Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms
-
D. Shao, K. Jiang, T. Kister, S. Bressan, and K.-L. Tan, "Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms," in DEXA, 2013, pp. 357-365.
-
(2013)
DEXA
, pp. 357-365
-
-
Shao, D.1
Jiang, K.2
Kister, T.3
Bressan, S.4
Tan, K.-L.5
|