-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Order preserving encryption for numeric data, in: Proc. of ACM SIGMOD, 2004, pp. 563-574.
-
(2004)
Proc. of ACM SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO, 2007, pp. 535-552.
-
(2007)
CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt, 2004, pp. 506-522.
-
(2004)
Eurocrypt
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proc. of TCC, 2007, pp. 535-554.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
5
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, in: Proc. of IEEE INFOCOM, 2011, pp. 829-837.
-
(2011)
Proc. of IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
6
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy-preserving query over encrypted graph-structured data in cloud computing, in: Proc. of 31st IEEE ICDCS, 2011, pp. 393-402.
-
(2011)
Proc. of 31st IEEE ICDCS
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
7
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
K. Chen, L. Liu, Privacy preserving data classification with rotation perturbation, in: Proc. of 5th IEEE ICDM, 2005.
-
(2005)
Proc. of 5th IEEE ICDM
-
-
Chen, K.1
Liu, L.2
-
9
-
-
84923124154
-
Secure knn query processing in untrusted cloud environments
-
S. Choi, G. Ghinita, H.-S. Lim, and E. Bertino Secure knn query processing in untrusted cloud environments IEEE Trans. Knowl. Data Eng. 26 11 2014 2818 2831
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.11
, pp. 2818-2831
-
-
Choi, S.1
Ghinita, G.2
Lim, H.-S.3
Bertino, E.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proc. of 13th ACM CCS, 2006, pp. 79-88.
-
(2006)
Proc. of 13th ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
84901750940
-
Secure k-nearest neighbor query over encrypted data in outsourced environments
-
Y. Elmehdwi, B.K. Samanthula, W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, in: IEEE 30th International Conference on Data Engineering, ICDE, 2014, pp. 664-675.
-
IEEE 30th International Conference on Data Engineering, ICDE
, vol.2014
, pp. 664-675
-
-
Elmehdwi, Y.1
Samanthula, B.K.2
Jiang, W.3
-
12
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
LNCS
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen On private scalar product computation for privacy-preserving data mining Proc. of 7th ICISC LNCS vol. 3506 2004 104 120
-
(2004)
Proc. of 7th ICISC
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
14
-
-
38049165825
-
Deriving private information from arbitrarily projected data
-
LNAI Springer-Verlag
-
S. Guo, and X. Wu Deriving private information from arbitrarily projected data Proc. of the 11th PAKDD LNAI vol. 4426 2007 Springer-Verlag 84 95
-
(2007)
Proc. of the 11th PAKDD
, vol.4426
, pp. 84-95
-
-
Guo, S.1
Wu, X.2
-
15
-
-
77951765127
-
Privacy-preserving gradient-descent methods
-
S. Han, W. Ng, L. Wan, and V. Lee Privacy-preserving gradient-descent methods IEEE Trans. Knowl. Data Eng. 22 6 2010 884 899
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.6
, pp. 884-899
-
-
Han, S.1
Ng, W.2
Wan, L.3
Lee, V.4
-
16
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, B. Choi, Processing private queries over untrusted data cloud through privacy homomorphism, in: Proc. of 27th IEEE ICDE, 2011, pp. 601-612.
-
(2011)
Proc. of 27th IEEE ICDE
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
17
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, T. Roeder, Dynamic searchable symmetric encryption, in: Proc. of ACM CCS, 2012, pp. 965-976.
-
(2012)
Proc. of ACM CCS
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
18
-
-
84877967287
-
Expressive search on encrypted data
-
J. Lai, X. Zhou, R.H. Deng, Y. Li, K. Chen, Expressive search on encrypted data, in: Proc. of 8th ASIACCS, 2013, pp. 243-252.
-
(2013)
Proc. of 8th ASIACCS
, pp. 243-252
-
-
Lai, J.1
Zhou, X.2
Deng, R.H.3
Li, Y.4
Chen, K.5
-
19
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
K. Liu, C. Giannella, H. Kargupta, An attacker's view of distance preserving maps for privacy preserving data mining, in: Proc. of 10th PKDD, 2006, pp. 297-308.
-
(2006)
Proc. of 10th PKDD
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
20
-
-
77954631038
-
Chapter 15: A survey of attack techniques on privacy-preserving data perturbation methods
-
Springer
-
K. Liu, C. Giannella, and H. Kargupta Chapter 15: A survey of attack techniques on privacy-preserving data perturbation methods Privacy-Preserving Data Mining 2008 Springer 359 381
-
(2008)
Privacy-Preserving Data Mining
, pp. 359-381
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS
-
P. Paillier Public-key cryptosystems based on composite degree residuosity classes EUROCRYPT LNCS vol. 1592 1999 223 238
-
(1999)
EUROCRYPT
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
84951784431
-
-
Paillier library
-
Paillier library. http://acsc.cs.utexas.edu/libpaillier/.
-
-
-
-
23
-
-
84881262361
-
An ideal-security protocol for order-preserving encoding
-
R.A. Popa, F.H. Li, N. Zeldovich, An ideal-security protocol for order-preserving encoding, in: Proc. of 34th IEEE Symposium on Security and Privacy, IEEE S&P, 2013, pp. 463-477.
-
(2013)
Proc. of 34th IEEE Symposium on Security and Privacy, IEEE S&P
, pp. 463-477
-
-
Popa, R.A.1
Li, F.H.2
Zeldovich, N.3
-
24
-
-
51849139413
-
Efficient privacy-preserving k-nearest neighbor search
-
Y. Qi, M. Atallah, Efficient privacy-preserving k-nearest neighbor search, in: Proc. of 28th IEEE ICDCS, 2008, pp. 311-319.
-
(2008)
Proc. of 28th IEEE ICDCS
, pp. 311-319
-
-
Qi, Y.1
Atallah, M.2
-
25
-
-
84926628839
-
K-nearest neighbor classification over semantically secure encrypted relational data
-
B.K. Samanthula, Y. Elmehdwi, and W. Jiang k-nearest neighbor classification over semantically secure encrypted relational data IEEE Trans. Knowl. Data Eng. 27 5 2015 1261 1273
-
(2015)
IEEE Trans. Knowl. Data Eng.
, vol.27
, Issue.5
, pp. 1261-1273
-
-
Samanthula, B.K.1
Elmehdwi, Y.2
Jiang, W.3
-
26
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. Chan, D. Song, A. Perrig, Multi-dimensional range query over encrypted data, in: IEEE Symposium on Security and Privacy, 2007, pp. 350-364.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.3
Song, D.4
Perrig, A.5
-
27
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proc. of IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
(2000)
Proc. of IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
28
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
ACM
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking Proc. of 8th ASIACCS 2013 ACM 71 82
-
(2013)
Proc. of 8th ASIACCS
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
29
-
-
84951759994
-
-
The GNU multiple precision arithmetic library
-
The GNU multiple precision arithmetic library. http://gmplib.org/.
-
-
-
-
31
-
-
84951815039
-
-
UCI machine learning repository
-
UCI machine learning repository. http://archive.ics.uci.edu/ml/.
-
-
-
-
32
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans. Parallel Distrib. Syst. 23 8 2012 1467 1479
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
33
-
-
84984889346
-
Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index
-
ACM
-
B. Wang, Y. Hou, M. Li, H. Wang, and H. Li Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index Proc. of 9th ASIACCS 2014 ACM
-
(2014)
Proc. of 9th ASIACCS
-
-
Wang, B.1
Hou, Y.2
Li, M.3
Wang, H.4
Li, H.5
-
34
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
C. Wang, Q. Wang, K. Ren, and J. Wang Harnessing the cloud for securely outsourcing large-scale systems of linear equations IEEE Trans. Parallel Distrib. Syst. 24 6 2013 1172 1181
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Wang, J.4
-
35
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. Wong, D. Cheung, B. Kao, N. Mamoulis, Secure knn computation on encrypted databases, in: Proc. of 35th SIGMOD, 2009, pp. 139-152.
-
(2009)
Proc. of 35th SIGMOD
, pp. 139-152
-
-
Wong, W.1
Cheung, D.2
Kao, B.3
Mamoulis, N.4
-
36
-
-
84951773230
-
Building confidential and efficient query services in the cloud with rasp data perturbation
-
H. Xu, S. Guo, K. Chen, Building confidential and efficient query services in the cloud with rasp data perturbation, IEEE Trans. Knowl. Data Eng.
-
IEEE Trans. Knowl. Data Eng.
-
-
Xu, H.1
Guo, S.2
Chen, K.3
-
37
-
-
33750247597
-
Privacy-preserving queries on encrypted data
-
Z. Yang, S. Zhong, R.N. Wright, Privacy-preserving queries on encrypted data, in: ESORICS, 2006, pp. 479-495.
-
(2006)
ESORICS
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
38
-
-
84881354487
-
Secure nearest neighbor revisited
-
B. Yao, F. Li, X. Xiao, Secure nearest neighbor revisited, in: Proc. of 29th IEEE ICDE, 2013, pp. 733-744.
-
(2013)
Proc. of 29th IEEE ICDE
, pp. 733-744
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
39
-
-
84555206093
-
Outsourced similarity search on metric data assets
-
M.L. Yiu, I. Assent, C.S. Jensen, and P. Kalnis Outsourced similarity search on metric data assets IEEE Trans. Knowl. Data Eng. 24 2 2012 338 352
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.2
, pp. 338-352
-
-
Yiu, M.L.1
Assent, I.2
Jensen, C.S.3
Kalnis, P.4
-
40
-
-
84883119889
-
Efficient privacy-preserving biometric identification in cloud computing
-
J. Yuan, S. Yu, Efficient privacy-preserving biometric identification in cloud computing, in: Proc. of IEEE INFOCOM, 2013, pp. 2652-2660.
-
(2013)
Proc. of IEEE INFOCOM
, pp. 2652-2660
-
-
Yuan, J.1
Yu, S.2
-
41
-
-
84893219360
-
Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data
-
Y. Zhu, T. Takagi, and R. Hu Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data IEICE Trans. Inf. Syst. E97-D 2 2014 326 330
-
(2014)
IEICE Trans. Inf. Syst.
, vol.97 E -D
, Issue.2
, pp. 326-330
-
-
Zhu, Y.1
Takagi, T.2
Hu, R.3
-
42
-
-
84878495668
-
Secure k-nn computation on encrypted cloud data without sharing key with query users
-
Y. Zhu, R. Xu, T. Takagi, Secure k-nn computation on encrypted cloud data without sharing key with query users, in: Proc. of ASIACCS Workshop on Security in Cloud Computing, 2013, pp. 55-60.
-
Proc. of ASIACCS Workshop on Security in Cloud Computing
, vol.2013
, pp. 55-60
-
-
Zhu, Y.1
Xu, R.2
Takagi, T.3
-
43
-
-
84893021109
-
Secure k-nn query on encrypted cloud database without key-sharing
-
Y. Zhu, R. Xu, and T. Takagi Secure k-nn query on encrypted cloud database without key-sharing Int. J. Electron. Secur. Digit. Forensics 5 3-4 2013 201 217
-
(2013)
Int. J. Electron. Secur. Digit. Forensics
, vol.5
, Issue.3-4
, pp. 201-217
-
-
Zhu, Y.1
Xu, R.2
Takagi, T.3
|