Author:
Dai Hua,Ji Yan,Liu Liang,Yang Geng,Yi Xun
Publisher
Springer International Publishing
Reference20 articles.
1. Grzonkowski, S., Corcoran, P.M., Coughlin, T.: Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: Proceedings of the IEEE International Conference on Consumer Electronics, Berlin, Germany, pp. 83–87 (2011)
2. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44–55. IEEE, Oakland (2000)
3. Cao, N., Wang, C., Li, M., Ren, K., Lou, J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–223 (2014)
4. Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: compressing and indexing documents and images. IEEE Trans. Inf. Theory 41(6), 79–80 (1995)
5. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International (2009)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献