-
1
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur.
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
2
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 965-976.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
3
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for Boolean queries
-
D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," in Proc. 33rd Annu. Cryptology Conf., 2013, pp. 353-373.
-
(2013)
Proc. 33rd Annu. Cryptology Conf.
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.S.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
6
-
-
84976428104
-
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
-
May
-
S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, May 2016.
-
(2016)
IEEE Trans. Image Process.
, vol.25
, Issue.7
, pp. 3411-3425
-
-
Hu, S.1
Wang, Q.2
Wang, J.3
Qin, Z.4
Ren, K.5
-
7
-
-
85100706388
-
Dynamic proofs of retrievability for coded cloud storage systems
-
Sep.
-
Z. Ren, L. Wang, Q. Wang, and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems," IEEE Trans. Service Comput., vol. PP, no. 99, pp. 1-1, Sep. 2015, Doi: 10.1109/TSC.2015.2481880.
-
(2015)
IEEE Trans. Service Comput.
, vol.PP
, Issue.99
, pp. 1
-
-
Ren, Z.1
Wang, L.2
Wang, Q.3
Xu, M.4
-
8
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
9
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Secur. Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Secur. Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
11
-
-
85173019558
-
Practical dynamic searchable encryption with small leakage
-
E. Stefanov, C. Papamanthou, and E. Shi, "Practical dynamic searchable encryption with small leakage," in Proc. Netw. Distrib. Syst. Secur. Symp., 2014, pp. 23-26.
-
(2014)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 23-26
-
-
Stefanov, E.1
Papamanthou, C.2
Shi, E.3
-
12
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. 2nd Int. Conf. Appl. Cryptography Netw. Secur., 2004, pp. 31-45.
-
(2004)
Proc. 2nd Int. Conf. Appl. Cryptography Netw. Secur.
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
13
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Theory Cryptography Conf., 2007, pp. 535-554.
-
(2007)
Proc. 4th Theory Cryptography Conf.
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
15
-
-
0000681228
-
A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces
-
R. Weber, H.-J. Schek, and S. Blott, "A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces," in Proc. 24th Int. Conf. Very Large Data Bases, 1998, pp. 194-205.
-
(1998)
Proc. 24th Int. Conf. Very Large Data Bases
, pp. 194-205
-
-
Weber, R.1
Schek, H.-J.2
Blott, S.3
-
16
-
-
18744416013
-
Image similarity search with compact data structures
-
Q. Lv, M. Charikar, and K. Li, "Image similarity search with compact data structures," in Proc. 13th ACM Int. Conf. Inf. Knowl. Manage., 2004, pp. 208-217.
-
(2004)
Proc. 13th ACM Int. Conf. Inf. Knowl. Manage.
, pp. 208-217
-
-
Lv, Q.1
Charikar, M.2
Li, K.3
-
17
-
-
84923867173
-
ADAM - Database and information retrieval system for big multimedia collections
-
I. Giangreco, I. Al Kabary, and H. Schuldt, "ADAM - Database and information retrieval system for big multimedia collections," in Proc. IEEE Int. Congr. Big Data, 2014, pp. 406-413.
-
(2014)
Proc. IEEE Int. Congr. Big Data
, pp. 406-413
-
-
Giangreco, I.1
Al Kabary, I.2
Schuldt, H.3
-
18
-
-
84864234736
-
Efficient similarity search over encrypted data
-
M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data," in Proc. IEEE 28th Int. Conf. Data Eng., 2012, pp. 1156-1167.
-
(2012)
Proc. IEEE 28th Int. Conf. Data Eng.
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
19
-
-
0038633576
-
Properties of embedding methods for similarity searching in metric spaces
-
May
-
G. R. Hjaltason and H. Samet, "Properties of embedding methods for similarity searching in metric spaces," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 5, pp. 530-549, May 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.5
, pp. 530-549
-
-
Hjaltason, G.R.1
Samet, H.2
-
20
-
-
84955245129
-
Multiprobe LSH: Efficient indexing for high-dimensional similarity search
-
Q. Lv, W. Josephson, Z. Wang, M. Charikar, and K. Li, "Multiprobe LSH: Efficient indexing for high-dimensional similarity search," in Proc. 33rd Int. Conf. Very Large Data Bases, 2007, pp. 950-961.
-
(2007)
Proc. 33rd Int. Conf. Very Large Data Bases
, pp. 950-961
-
-
Lv, Q.1
Josephson, W.2
Wang, Z.3
Charikar, M.4
Li, K.5
-
21
-
-
84883119889
-
Efficient privacy-preserving biometric identification in cloud computing
-
J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing," in Proc. IEEE INFOCOM, 2013, pp. 2652-2660.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2652-2660
-
-
Yuan, J.1
Yu, S.2
-
22
-
-
84898945995
-
Semantic search over encrypted data
-
T. Moataz, A. Shikfa, N. Cuppens-Boulahia, and F. Cuppens, "Semantic search over encrypted data," in Proc. 20th Int. Conf. Telecommun., 2013, pp. 1-5.
-
(2013)
Proc. 20th Int. Conf. Telecommun.
, pp. 1-5
-
-
Moataz, T.1
Shikfa, A.2
Cuppens-Boulahia, N.3
Cuppens, F.4
-
23
-
-
84904421834
-
Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
-
B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
24
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
25
-
-
40549119527
-
Features for image retrieval: An experimental comparison
-
T. Deselaers, D. Keysers, and H. Ney, "Features for image retrieval: An experimental comparison," Inf. Retrieval, vol. 11, no. 2, pp. 77-107, 2008.
-
(2008)
Inf. Retrieval
, vol.11
, Issue.2
, pp. 77-107
-
-
Deselaers, T.1
Keysers, D.2
Ney, H.3
-
26
-
-
84871949205
-
Approximate nearest neighbor: Towards removing the curse of dimensionality
-
S. Har-Peled, P. Indyk, and R. Motwani, "Approximate nearest neighbor: Towards removing the curse of dimensionality," Theory Comput., vol. 8, no. 1, pp. 321-350, 2012.
-
(2012)
Theory Comput.
, vol.8
, Issue.1
, pp. 321-350
-
-
Har-Peled, S.1
Indyk, P.2
Motwani, R.3
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223-238.
-
(1999)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
4544259509
-
Localitysensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Localitysensitive hashing scheme based on p-stable distributions," in Proc. 20th Annu. Symp. Comput. Geometry, 2004, pp. 253-262.
-
(2004)
Proc. 20th Annu. Symp. Comput. Geometry
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
31
-
-
77953184849
-
Kernelized locality-sensitive hashing for scalable image search
-
B. Kulis and K. Grauman, "Kernelized locality-sensitive hashing for scalable image search," in Proc. IEEE 12th Int. Conf. Comput. Vision, 2009, pp. 2130-2137.
-
(2009)
Proc. IEEE 12th Int. Conf. Comput. Vision
, pp. 2130-2137
-
-
Kulis, B.1
Grauman, K.2
|