共 33 条
- [1] Ren K., Wang C., Wang Q., Security challenges for the public cloud, IEEE Internet Computing, 16, 1, pp. 69-73, (2012)
- [2] Wang Q., Zhang Y., Lu X., Et al., Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy, IEEE Transactions on Dependable and Secure Computing, 15, 4, pp. 591-606, (2016)
- [3] Du M., Wang Q., He M., Et al., Privacy-preserving indexing and query processing for secure dynamic cloud storage, IEEE Transactions on Information Forensics and Security, 13, 9, pp. 2320-2332, (2018)
- [4] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proc of the 2000 IEEE Security and Privacy Symp., pp. 44-55, (2000)
- [5] Li J., Wang Q., Wang C., Et al., Fuzzy keyword search over encrypted data in cloud computing, Proc of the 2010 IEEE INFOCOM, pp. 1-5, (2010)
- [6] Cao N., Wang C., Li M., Et al., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 25, 1, pp. 222-233, (2013)
- [7] Wang Q., He M., Du M., Et al., Searchable encryption over feature-rich data, IEEE Transactions on Dependable and Secure Computing, 15, 3, pp. 496-510, (2016)
- [8] Hu S., Wang Q., Wang J., Et al., Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data, IEEE Transactions on Image Processing, 25, 7, pp. 3411-3425, (2016)
- [9] Song W., Wang B., Wang Q., Et al., Publicly verifiable computation of polynomials over outsourced data with multiple sources, IEEE Transactions on Information Forensics and Security, 12, 10, pp. 2334-2347, (2017)
- [10] Xia Z., Wang X., Sun X., Et al., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 27, 2, pp. 340-352, (2015)