-
1
-
-
84862563533
-
An smdp-based service model for interdomain resource allocation in mobile cloud networks
-
H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, "An smdp-based service model for interdomain resource allocation in mobile cloud networks," IEEE Transactions on Vehicular Technology, Vol. 61, no. 5, pp. 2222-2232, 2012.
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.5
, pp. 2222-2232
-
-
Liang, H.1
Cai, L.X.2
Huang, D.3
Shen, X.4
Peng, D.5
-
2
-
-
84904444112
-
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
-
IEEE
-
W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud," in Proceedings of INFOCOM. IEEE, 2014.
-
(2014)
Proceedings of INFOCOM
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
3
-
-
84928687796
-
Secure dynamic searchable symmetric encryption with constant document update cost
-
USA to appear
-
Y. Yang, H. Li, W. Liu, H. Yang, and M. Wen, "Secure dynamic searchable symmetric encryption with constant document update cost," in Proceedings of GLOBECOM, USA, 2014, to appear.
-
(2014)
Proceedings of GLOBECOM
-
-
Yang, Y.1
Li, H.2
Liu, W.3
Yang, H.4
Wen, M.5
-
4
-
-
84907003785
-
Achieving ranked range query in smart grid auction market
-
Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, "Achieving ranked range query in smart grid auction market," in Proceedings of ICC, 2014, pp. 951-956.
-
(2014)
Proceedings of ICC
, pp. 951-956
-
-
Yang, Y.1
Li, H.2
Wen, M.3
Luo, H.4
Lu, R.5
-
5
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, D. W.-I. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009, pp. 139-152.
-
(2009)
Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-I.2
Kao, B.3
Mamoulis, N.4
-
6
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Transactions on Parallel and Distributed Systems, Vol. 25, no. 1, pp. 222-233, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
8
-
-
84904410658
-
Vabks: Verifiable attribute-based keyword search over outsourced encrypted data
-
IEEE
-
Q. Zheng, S. Xu, and G. Ateniese, "Vabks: Verifiable attribute-based keyword search over outsourced encrypted data," in Proceedings of INFOCOM. IEEE, 2014.
-
(2014)
Proceedings of INFOCOM
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
9
-
-
84906995292
-
Achieving multi-authority access control with efficient attribute revocation in smart grid
-
D. Liu, H. Li, Y. Yang, and H. Yang, "Achieving multi-authority access control with efficient attribute revocation in smart grid," in Proceedings of ICC, 2014, pp. 634-639.
-
(2014)
Proceedings of ICC
, pp. 634-639
-
-
Liu, D.1
Li, H.2
Yang, Y.3
Yang, H.4
-
11
-
-
84915747851
-
Emrq: An efficient multi-keyword range query scheme in smart grid auction market
-
H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, "Emrq: An efficient multi-keyword range query scheme in smart grid auction market." KSII Transactions on Internet and Information Systems, Vol. 8, no. 11, pp. 3937-3954, 2014.
-
(2014)
KSII Transactions on Internet and Information Systems
, vol.8
, Issue.11
, pp. 3937-3954
-
-
Li, H.1
Yang, Y.2
Wen, M.3
Luo, H.4
Lu, R.5
-
12
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
13
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in the 13th ACM conference on Computer and communications security, 2006, pp. 79-88.
-
(2006)
The 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
14
-
-
84924804821
-
Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage
-
H. Li, D. Liu, Y. Dai, T. H. Luan, and X. S. Shen, "Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage," IEEE Transactions on Emerging Topics in Computing, 2014, DOI: 10.1109/TETC.2014.2371239.
-
(2014)
IEEE Transactions on Emerging Topics in Computing
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
Shen, X.S.5
-
15
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proceedings of EUROCRYPT. Springer, 2004, pp. 506-522.
-
(2004)
Proceedings of EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
|