Author:
Sharma Ravi,Villányi Balázs
Reference22 articles.
1. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Order preserving encryption for numeric data, in: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574.
2. N. Chenette, K. Lewi, S.A. Weis, D.J. Wu, Practical order-revealing encryption with limited leakage, in: International conference on fast software encryption, Springer, pp. 474–493.
3. G. Das, D. Gunopulos, N. Koudas, D. Tsirogiannis, Answering top-k queries using views, in: Proceedings of the 32nd international conference on Very large data bases, pp. 451–462.
4. Secure k-nearest neighbor queries in two-tiered mobile wireless sensor networks;Fan;Digital Commun. Networks,2020
5. E. Khoury, M. Medlej, C. Abou Jaoude, C. Guyeux, Novel order preserving encryption scheme for wireless sensor networks, in: 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), IEEE, pp. 1–6.