Related references
Note: Only part of the references are listed.Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data
Chang Liu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries
Can Zhang et al.
INFORMATION SCIENCES (2020)
New Order-Revealing Encryption with Shorter Ciphertexts
Kee Sung Kim
INFORMATION (2020)
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
Dmytro Bogatov et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2019)
Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers
Keke Gai et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage
Yi Dou et al.
COMPUTER JOURNAL (2018)
Searchable Encryption over Feature-Rich Data
Qian Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
Minxin Du et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection
Meng Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Cryptanalysis of Comparable Encryption in SIGMOD'16
Caleb Horst et al.
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2017)
Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud
Chang Liu et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2017)
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing
Rui Li et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2016)
The Internet of Things in Healthcare Potential Applications and Challenges
Phillip A. Laplante et al.
IT PROFESSIONAL (2016)
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee et al.
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II (2015)
Building hybrid access control by configuring RBAC and MAC features
Sangsig Kim et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2014)
A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data
Ce Yang et al.
2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC) (2012)
Searchable symmetric encryption: Improved definitions and efficient constructions
Reza Curtmola et al.
JOURNAL OF COMPUTER SECURITY (2011)