-
1
-
-
84904421834
-
Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
-
Apr./May
-
B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
2
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Apr.
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr. 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
3
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ASIACCS, 2013, pp. 71-82.
-
(2013)
Proc. 8th ASIACCS
, pp. 71-82
-
-
Sun, W.1
-
4
-
-
84874053923
-
Efficient multikeyword ranked query on encrypted data in the cloud
-
Dec.
-
Z. Xu, W. Kang, R. Li, K. C. Yow, C.-Z. Xu, "Efficient multikeyword ranked query on encrypted data in the cloud," in Proc. 18th IEEE Int. Conf. Parallel Distrib. Syst., Dec. 2012, pp. 244-251.
-
(2012)
Proc. 18th IEEE Int. Conf. Parallel Distrib. Syst.
, pp. 244-251
-
-
Xu, Z.1
Kang, W.2
Li, R.3
Yow, K.C.4
Xu, C.-Z.5
-
5
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016, doi: 10.1109/TPDS.2015.2401003.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
6
-
-
84902815285
-
Semantic keyword search based on trie over encrypted cloud data
-
Jun.
-
Z. Fu, J. Shu, X. Sun, D. Zhang, "Semantic keyword search based on trie over encrypted cloud data," in Proc. 2nd Int. Workshop Security Cloud Comput., Kyoto, Japan, Jun. 2014, pp. 59-62.
-
(2014)
Proc. 2nd Int. Workshop Security Cloud Comput., Kyoto, Japan
, pp. 59-62
-
-
Fu, Z.1
Shu, J.2
Sun, X.3
Zhang, D.4
-
7
-
-
84923796188
-
Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data
-
Nov.
-
Z. Fu, J. Shu, X. Sun, N. Linge, "Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data," IEEE Trans. Consum. Electron., vol. 60, no. 4, pp. 762-770, Nov. 2014.
-
(2014)
IEEE Trans. Consum. Electron.
, vol.60
, Issue.4
, pp. 762-770
-
-
Fu, Z.1
Shu, J.2
Sun, X.3
Linge, N.4
-
8
-
-
80052398037
-
Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
-
Jun.
-
M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Jun. 2011, pp. 273-281.
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW)
, pp. 273-281
-
-
Chuah, M.1
Hu, W.2
-
9
-
-
80055115224
-
Fuzzy keyword search on encrypted cloud storage data with small index
-
Sep.
-
C. Liu, L. Zhu, L. Li, Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," in Proc. ICCCIS, Sep. 2011, pp. 269-273.
-
(2011)
Proc. ICCCIS
, pp. 269-273
-
-
Liu, C.1
Zhu, L.2
Li, L.3
Tan, Y.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. CCS, 2006, pp. 79-88.
-
(2006)
Proc. CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
84864234736
-
Efficient similarity search over encrypted data
-
Washington, DC, USA, Apr.
-
M. Kuzu, M. S. Islam, M. Kantarcioglu, "Efficient similarity search over encrypted data," in Proc. 28th IEEE Int. Conf. Data Eng., Washington, DC, USA, Apr. 2012, pp. 1156-1167.
-
(2012)
Proc. 28th IEEE Int. Conf. Data Eng.
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
12
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
Mar
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
13
-
-
84937574040
-
Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query
-
J.Wang, X. Yu, M. Zhao, "Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query," Arabian J. Sci. Eng., vol. 40, no. 8, pp. 2375-2388, 2015.
-
(2015)
Arabian J. Sci. Eng.
, vol.40
, Issue.8
, pp. 2375-2388
-
-
Wang, J.1
Yu, X.2
Zhao, M.3
-
15
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
P. Indyk and R. Motwani, "Approximate nearest neighbors: Towards removing the curse of dimensionality," in Proc. 30th ACM Symp. Theory Comput., 1998, pp. 604-613.
-
(1998)
Proc. 30th ACM Symp. Theory Comput.
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
16
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
17
-
-
84881354487
-
Secure nearest neighbor revisited
-
X. Xiao, F. Li, B. Yao, "Secure nearest neighbor revisited," in Proc. Int. Conf. Data Eng., 2013, pp. 733-744.
-
(2013)
Proc. Int. Conf. Data Eng.
, pp. 733-744
-
-
Xiao, X.1
Li, F.2
Yao, B.3
-
18
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. SCG, 2004, pp. 253-262.
-
(2004)
Proc. SCG
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
19
-
-
35148868279
-
-
RFC accessed on Jul. 1 2016
-
RFC. Request for Comments, accessed on Jul. 1, 2016. [Online]. Available: http://www.ietf.org/rfc.html
-
Request for Comments
-
-
-
20
-
-
84948481845
-
An algorithm for suffix stripping
-
M. F. Porter, "An algorithm for suffix stripping," Program, vol. 14, no. 3, pp. 130-137, 1980.
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
21
-
-
0001794236
-
Development of a stemming algorithm
-
Mar./Jun.
-
J. B. Lovins, "Development of a stemming algorithm," Mech. Transl. Comput. Linguistics, vol. 11, pp. 22-31, Mar./Jun. 1968.
-
(1968)
Mech. Transl. Comput. Linguistics
, vol.11
, pp. 22-31
-
-
Lovins, J.B.1
-
22
-
-
46549088731
-
Managing gigabytes: Compressing and indexing documents and images
-
Nov.
-
I. H. Witten, A. Moffat, T. C. Bell, "Managing gigabytes: Compressing and indexing documents and images," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 2101-2102, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 2101-2102
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
23
-
-
38049045519
-
Conjunctive, subset, range queries on encrypted data
-
Feb.
-
D. Boneh and B. Waters, "Conjunctive, subset, range queries on encrypted data," in Proc. 4th Theory Cryptogr. Conf., Amsterdam, Netherlands, Feb. 2007, pp. 535-554.
-
(2007)
Proc. 4th Theory Cryptogr. Conf., Amsterdam, Netherlands
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
24
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Jun.
-
P. Golle, J. Staddon, B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. 2nd Int. Conf. ACNS, Yellow Mountain, China, Jun. 2004, pp. 31-45.
-
(2004)
Proc. 2nd Int. Conf. ACNS, Yellow Mountain, China
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
25
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data," in Proc. SP, 2000, pp. 44-55.
-
(2000)
Proc. SP
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
26
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Jun.
-
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. 30th IEEE Int. Conf. Distrib. Comput. Syst., Genoa, Italy, Jun. 2010, pp. 253-262.
-
(2010)
Proc. 30th IEEE Int. Conf. Distrib. Comput. Syst., Genoa, Italy
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
27
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. ACNS, 2005, pp. 442-455.
-
(2005)
Proc. ACNS
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
28
-
-
84960539113
-
Verifiable auditing for outsourced database in cloud computing
-
Nov.
-
J. Wang, X. Chen, X. Huang, I. You, Y. Xiang, "Verifiable auditing for outsourced database in cloud computing," IEEE Trans. Comput., vol. 64, no. 11, pp. 3293-3303, Nov. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.11
, pp. 3293-3303
-
-
Wang, J.1
Chen, X.2
Huang, X.3
You, I.4
Xiang, Y.5
-
29
-
-
85043522126
-
Catch you if you misbehave: Ranked keyword search results verification in cloud computing
-
to be published
-
W. Zhang, Y. Lin, Q. Gu, "Catch you if you misbehave: Ranked keyword search results verification in cloud computing," IEEE Trans. Cloud Comput., to be published, doi: 10.1109/TCC.2015.2481389.
-
IEEE Trans. Cloud Comput.
-
-
Zhang, W.1
Lin, Y.2
Gu, Q.3
-
30
-
-
84973579525
-
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
May/Jun.
-
H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, X. S. Shen, "Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data," IEEE Trans. Dependable Secure Comput., vol. 13, no. 3, pp. 312-325, May/Jun. 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.13
, Issue.3
, pp. 312-325
-
-
Li, H.1
Yang, Y.2
Luan, T.H.3
Liang, X.4
Zhou, L.5
Shen, X.S.6
-
31
-
-
84954217862
-
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
-
Apr./May
-
B. Wang, W. Song, W. Lou, Y. T. Hou, "Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee," in Proc. IEEE INFOCOM, Apr./May 2015, pp. 2092-2100.
-
(2015)
Proc. IEEE INFOCOM
, pp. 2092-2100
-
-
Wang, B.1
Song, W.2
Lou, W.3
Hou, Y.T.4
-
32
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
to be published
-
Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published, doi: 10.1109/TPDS.2015.2506573.
-
IEEE Trans. Parallel Distrib. Syst.
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
|