Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 365-369.
Previous Articles Next Articles
YU Zhi-bin and ZHOU Yan-hui
[1] Vouk M A.Cloud computing — Issues,research and implementations[C]∥30th International Conference on Information Technology Interfaces,2008(ITI 2008).IEEE,2008:31-40 [2] Jansen W A.Cloud Hooks:Security and Privacy Issues in Cloud Computing[J].Hawaii International Conference on System Scien-ces,2011:1-10 [3] Ren K,Wang C,Wang Q.Security Challenges for the Public Cloud[J].Internet Computing,IEEE,2012,16(1):69-73 [4] Bugiel S,Nurnberger S,Sadeghi A.Twin clouds:all architecture for secure computing [C]∥Workshop on Cryptography and Security in Clouds.Zurich,Switzerland,2011:1-l1 [5] Pearson S,Shen Y,Mowbray M.A Privacy Manager For Cloud Computing[J].Cloud Computing,2009,5931:90-106 [6] Chor B,Goldreich O,Kushilevitz E,et al.Private information retrieval[C]∥Foundations of Computer Science,1995.IEEE,1995:41-50 [7] Kushilevitz E,Ostrovsky R.Replication Is Not Needed:Single Database,Computationally-Private Information Retrieval (Extended Abstract)[C]∥PROC.of 38th Annu.IEEE Symp.on Foundation of Computer Science.1997:364-373 [8] Yoshida R,Cui Y,Sekino T,et al.Practical Searching over Encrypted Data by Private Information Retrieval[J].Global Telecommunications Conference,IEEE,2011:1-5 [9] Rafail O,William E,Skeith III.A survey of single-database private information retrieval:techniques and applications[C]∥Public Key Cryptography(PKC 2007).2007:393-411 [10] Boneh D,Kushilevitz E,Ostrovsky R,et al.Public Key Encryption That Allows PIR Queries[J].Lecture Notes in Computer Science,2007,4622:50-67 [11] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74 [12] Sion R.On the Computational Practicality of Private Information Retrieval[C]∥Proceedings of the Network and Distributed Systems Security Symposium,2007.Stony Brook Network Security and Applied Cryptography Lab Tech Report,2007 [13] Kamara S,Raykova M.Parallel Homomorphic Encryption[J].Lecture Notes in Computer Science,2011 [14] Chang Y C.Single Database Private Information Retrieval with Logarithmic Communication[C]∥Information Security and Privacy:9th Australasian Conference,Sydney,Australia,2004.Berlin,Germany:Springer,2004:50-61 [15] Pietro R D,nen M,Blass E,et al.PRISM-Privacy-Preserving Search in MapReduce[J].Privacy Enhancing Technologies,volume 7384 of Lecture Notes in Computer Science,2012 [16] Melchor C A,Crespin B,Gaborit P,et al.High-speed private information retrieval computation on GPU[C]∥IEEE SECURWARE.2008:263-272 [17] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74 [18] Lipmaa H.An Oblivious Transfer Protocol with Log-SquaredCommunication[C]∥Proc.Information Security Conf.(ISC ’05).2005 [19] Stern J P.A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol[J].Lecture Notes in Computer Science,1998:357-371 [20] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥UROCRYPT.1999:223-238 [21] Dean J,Ghemawat S.MapReduce:simplified data processing on large clusters[C]∥Proceedings of 6th Conference on Symposium on Operatins Systems Design and Implementation(OSDI’04).2004 [22] Ishai Y,Kushilevitz E,Ostrovsky R,et al.Batch Codes andTheir Applications[C]∥Proceedings of the 36th Annual ACM Symposium on Theory of Computing.2004:262-271 [23] Yoshida R,Cui Y,Shigetomi R,et al.The Practicality of theKeyword Search Using Pir[C]∥International Symposium on Information Theory and Its Applications(ISITA 2008).2008:1-6 [24] Botelho F C,Galinkin D,Meira W,et al.External perfect hashing for very large key sets[C]∥Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Mana(CIKM ’07).2007:653-662 [25] Botelho F C,Lacerda A,Menezes G V,et al.Minimal perfect hashing:A competitive method for indexing internal memory[J].Information Sciences,2011,181(13):2608-2625 |
No related articles found! |
|