Computer Science ›› 2017, Vol. 44 ›› Issue (5): 146-152.doi: 10.11896/j.issn.1002-137X.2017.05.026
Previous Articles Next Articles
HE Heng, XIA Wei, ZHANG Ji, JIN Yu and LI Peng
[1] ARMBRUST M,FOX A,GRIFFITH R,et al.Above the C-louds:A Berkeley View of Cloud Computing[J].Communications of the ACM,2010,53(4):50-58. [2] LI J,WANG Q,WANG C,et al.Fuzzy Keyword Search over Encrypted data in Cloud Computing [C]∥Proceedings of IEEE INFOCOM,Mini-Conference.San Diego:IEEE Press,2010:441-445. [3] XIANG F,LIU C Y,FANG B X,et al.Research on Ciphertext Search for the Cloud Environment[J].Journal on Communications,2013,34(7):143-153.(in Chinese) 项菲,刘川意,方滨兴,等.云计算环境下密文搜索算法的研究 [J].通信学报,2013,34(7):143-153. [4] SONG D,WAGNER D,PERRIG A.Practical Techniques forSearches on Encrypted data[C]∥Proceedings of IEEE Sympo-sium on Security and Privacy.Washington:IEEE Computer So-ciety Press,2000:44-55. [5] CURTMOLA R,GARAY J,KAMARA S,et al.SearchableSymmetric Encryption:Improved Definitions and Efficient Constructions[J].Journal of Computer Security,2011,19(5):895-934. [6] BONEH D,CRESCENZO GIOVANNI D,OSTROVSKY R,et al.Public Key Encryption with Keyword Search [C]∥Procee-dings of International Conference on Theory and Application of Cryptographic Techniques.Springer,Berlin,Heidelberg,2004:506-522. [7] WANG C,CAO N,LI J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data [C]∥Proceedings of the IEEE 30th International Conference on Distributed Computing Systems.Genova:IEEE Computer Society,2010:253-262. [8] CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [C]∥IEEE Transactions on Parallel and Distributed Systems.Atlanta:IEEE Computer Society,2011:829-837. [9] WONG W K,CHEUNG W L,KAO B,et al.Secure kNN Computation on Encrypted Databases [C]∥Proceedings of the ACM SIGMOD International Conference on Management of Data.New York:ACM,2009:139-152. [10] LI R X,XU Z Y,KANG W S,et al.Efficient Multi-keyword Ranked Query over Encrypted data in Cloud Computing [J].Future Generation Computer Systems,2014,30(1):179-190. [11] FENG G L,TAN L.Multi-attribute Ranked Keyword Searchover Encrypted Cloud data [J].Computer Science,2013,40(11):131-136.(in Chinese) 冯贵兰,谭良.云环境中基于多属性排序的密文检索方案[J].计算机科学,2013,40(11):131-136. [12] LIU C,ZHU L H,LI L Y J,et al.Fuzzy Keyword Search on Encrypted Cloud Storage Data with Small Index [C]∥Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems.Beijing:Institute of Electrical and Electro-nics Engineers,2011:269-273. [13] WANG B,YU S C,LOU W J,et al.Privacy-preserving Multi-keyword Fuzzy Search over Encrypted Data in the Cloud [C]∥Proceedings of IEEE INFOCOM.Toronto:Institute of Electrical and Electronics Engineers,2014:2112-2120. [14] BLOOM BURTON H.Space/time Trade-offs in hash Codingwith Allowable Errors [J].Communications of the Acm,2010,13(7):422-426. [15] CHARIKAR M.Similarity Estimation Techniques from Rounding Algorithms [C]∥Proceedings of the Thirty-fourth Annual ACM Symposium on Theory of Computing.New York:ACM,2002:380-388. [16] FAN L,CAO P,ALMEIDA J,et al.Summary Cache:a Scalable Wide-area Web Cache Sharing Protocol [J].IEEE/ACM Tran-sactions on Networking,2000,8(3):281-293. [17] INDYK P,MOTWANI R.Approximate Nearest Neighbors:towards Removing the Curse of Dimensionality [C]∥Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing.New York:ACM,1998:604-613. [18] SUN W H,LOU W J,HOU T,et al.Privacy-Preserving Keyword Search over Encrypted Data in Cloud Computing [C]∥Secure Cloud Computing.Amsterdam:Springer,2014:189-212. [19] Enron email dataset [EB/OL].(2015-03-12) http://www.cs.cmu.edu/~./enron. |
No related articles found! |
|