SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Bo Yang, Xiao-Qiong Pang, Jun-Qiang Du, Dan Xie. Effective Error-Tolerant Keyword Search for Secure Cloud Computing[J]. Journal of Computer Science and Technology, 2014, 29(1): 81-89. DOI: 10.1007/s11390-013-1413-6 |
[1] |
Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication, SP 800-145, September 2011. http://csrc. nist.gov/publications/nistpubs/800-145/SP800-145.pdf
|
[2] |
Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7(4): 61-64.
|
[3] |
Gentry C. Computing arbitrary functions of encrypted data. Communications of the ACM, 2010, 53(3): 97-105.
|
[4] |
Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. EUROCRYPT 2004, May 2004, pp.506-522.
|
[5] |
Boneh D, Kushilevitz E, Ostrovsky R, Skeith W. Publickey encryption that allows PIR queries. In Proc. the 27th CRYPTO, Aug. 2007, pp.50-67.
|
[6] |
Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, Feb. 2007, pp.535-554.
|
[7] |
Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption. In Proc. the IEEE International Conference on Communications, June 2009.
|
[8] |
Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd Int. Conf. Applied Cryptography and Network Security, June 2005, pp.442-455.
|
[9] |
Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Computer Security, 2011, 19(5): 895-934.
|
[10] |
Goh E. Secure indexes. IACR ePrint Cryptography Archive, 2003. http://eprint.iacr.org/2003/216, Dec. 2013.
|
[11] |
Li J,Wang Q,Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In Proc. the 29th IEEE INFOCOM, March 2010, pp.441-445.
|
[12] |
Ma S, Yang B, Li K, Xia F. A privacy-preserving join on outsourced database. In Proc. the 14th Information Security Conference, Oct. 2011, pp.278-292.
|
[13] |
Park D, Kim K, Lee P. Public key encryption with conjunctive field keyword search. In Proc. the 5th Int. Workshop on Information Security Applications, Aug. 2004, pp.73-86.
|
[14] |
Pinkas B, Reinman T. Oblivious RAM revisited. In Proc. the 30th CRYPT, Aug. 2010, pp.502-519.
|
[15] |
Shi E, Bethencourt J, Chan T et al. Multi-dimensional range query over encrypted data. In Proc. the 2007 IEEE Symp. Security and Privacy, May 2007, pp.350-364.
|
[16] |
Song D,Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the 2000 IEEE Symposium on Security and Privacy, May 2000, pp.44-55.
|
[17] |
van Liesdonk P, Sedghi S, Doumen J et al. Computationally efficient searchable symmetric encryption. In Proc. the 7th VLDB Workshop. Secure Data Management, Sept. 2010, pp. 87-100.
|
[18] |
Pang X, Yang B, Huang Q. Privacy-preserving noisy keyword search in cloud computing. In Proc. the 14th Int. Conf. Information and Communications Security, October 2012, pp.154-166.
|
[19] |
Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMS. Journal of the ACM, 1996, 43(3): 431-473.
|
[20] |
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing, 2008, 38(1): 97-139.
|
[1] | Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen. Private Keyword-Search for Database Systems Against Insider Attacks[J]. Journal of Computer Science and Technology, 2017, 32(3): 599-617. DOI: 10.1007/s11390-017-1745-8 |
[2] | Yu-Rong Cheng, Ye Yuan, Jia-Yu Li, Lei Chen, Guo-Ren Wang. Keyword Query over Error-Tolerant Knowledge Bases[J]. Journal of Computer Science and Technology, 2016, 31(4): 702-719. DOI: 10.1007/s11390-016-1658-y |
[3] | Dan Yang, De-Rong Shen, Ge Yu, Yue Kou, Tie-Zheng Nie. Query Intent Disambiguation of Keyword-Based Semantic Entity Search in Dataspaces[J]. Journal of Computer Science and Technology, 2013, 28(2): 382-393. DOI: 10.1007/s11390-013-1338-0 |
[4] | Zu-Jie Ren, Ke Chen, Li-Dan Shou, Gang Chen, Yi-Jun Bei, Xiao-Yan Li. HAPS: Supporting Effective and Efficient Full-Text P2P Search with Peer Dynamics[J]. Journal of Computer Science and Technology, 2010, 25(3): 482-498. |
[5] | Narjes Hachani, Mohamed Ali Ben Hassine, Hanène Chettaoui, Habib Ounelli. Cooperative Answering of Fuzzy Queries[J]. Journal of Computer Science and Technology, 2009, 24(4): 675-686. |
[6] | Jun Zhang, Zhao-Hui Peng, Shan Wang, Hui-Jing Nie. CLASCN: Candidate Network Selection for Efficient Top-k Keyword Queries over Databases[J]. Journal of Computer Science and Technology, 2007, 22(2): 197-207. |
[7] | Shan Wang, Kun-Long Zhang. Searching Databases with Keywords[J]. Journal of Computer Science and Technology, 2005, 20(1). |
[8] | Shen Li. Fuzzy Logic Control ASIC Chip[J]. Journal of Computer Science and Technology, 1997, 12(3): 263-270. |
[9] | Wang Shijun, Wang Shulin. Research and Design of a Fuzzy Neural Expert System[J]. Journal of Computer Science and Technology, 1995, 10(2): 112-123. |
[10] | Liu Dongbo, Li Deyi. A Fuzzy Proof Theory[J]. Journal of Computer Science and Technology, 1990, 5(1): 92-96. |