Author:
Li Lu,Jiang Xufeng,Zhu Fei,Liu An
Reference24 articles.
1. Lecture Notes in Computer Science;P Paillier,1999
2. Liu, J., Yang, J., Xiong, L., Pei, J.: Secure skyline queries on cloud platform. In: ICDE, pp. 633–644 (2017)
3. Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD, pp. 139–152 (2009)
4. Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: ICDE, pp. 601–612 (2011)
5. Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: ICDE, pp. 733–744 (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient and Privacy-Preserving Range Queries over Outsourced Cloud;2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE);2023-04-14
2. Privacy-Preserving kNN Spatial Query Using Voronoi Diagram;Proceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021);2022