共 14 条
- [1] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proc. of the 2000 IEEE Symp. on Security and Privacy, pp. 44-55, (2000)
- [2] Goh E.J., Secure Indexes, 216, pp. 1-19, (2004)
- [3] Wang C., Cao N., Li J., Ren K., Lou W., Secure ranked keyword search over encrypted cloud data, Proc. of the 2010 Int'l Conf. on Distributed Computing Systems, pp. 253-262, (2010)
- [4] Sun W., Wang B., Cao N., Li M., Lou W., Hou Y.T., Li H., Privacy-Preserving multi-keyword text search in the cloud supporting similarity-based ranking, Proc. of the ASIA 8th ACM Symp. on Information, Computer and Communications Security (CCS 2013), pp. 71-82, (2013)
- [5] Leslie H., Jain R., Birdsall D., Yaghmai H., Efficient search of multi-dimensional B-trees, Proc. of the 21th Int'l Conf. on Very Large Data Bases (VLDB'95), pp. 710-719, (1995)
- [6] Ciaccia P., Patella M., Rabitti F., Zezula P., Indexing metric spaces with M-tree, Proc. of the SEBD, pp. 67-86, (1997)
- [7] Wang C., Cao N., Ren K., Lou W.J., Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Trans. on Parallel and Distributed Systems, 23, 8, pp. 1467-1479, (2012)
- [8] Yu S., Wang C., Ren K., Lou W., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proc. of the 2010 IEEE INFOCOM, pp. 1-9, (2010)
- [9] Kaufman L., Rousseeuw P.J., Finding Groups in Data: An Introduction to Cluster Analysis, pp. 108-110, (2005)
- [10] White D., Jain R., Similarity indexing with the SS-tree, Proc. of the 20th Int'l Conf. on Data Engineering, pp. 516-523, (1996)