Funder
National Natural Science Foundation of China
Jiangsu Provincial Department of Education
Subject
Software,Hardware and Architecture,Computer Science Applications,Computer Networks and Communications,Computational Theory and Mathematics
Reference30 articles.
1. B. Yao, F. Li, X. Xiao, Secure nearest neighbor revisited, in: IEEE 29th International Conference on Data Engineering, ICDE, 2013, pp. 733–744.
2. B. Wang, Y. Hou, M. Li, Practical and secure nearest neighbor search on encrypted large-scale data, in: 35th Annual IEEE International Conference on Computer Communications, 2016, pp. 1–9.
3. Secure k-nearest neighbor query over encrypted data in outsourced environments;Elmehdwi,2014
4. A secure knn query processing algorithm using homomorphic encryption on outsourced database;Kim;Data Knowl. Eng.,2019
5. Svknn: Efficient secure and verifiable k-nearest neighbor query on the cloud platform;Cui,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献