Sign Up to like & get
recommendations!
1
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-018-3145-6
Abstract: Nowadays, fast growing number of users and business are motivated to outsource their private data to public cloud servers. Taking into consideration security issues, private data should be encrypted before being outsourced to remote servers,…
read more here.
Keywords:
keyword;
search;
means clustering;
file locality ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0394-9
Abstract: Conjunctive searchable encryption is an efficient way to perform multi-keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing…
read more here.
Keywords:
keyword;
search;
conjunctive keyword;
integrity ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Distributed and Parallel Databases"
DOI: 10.1007/s10619-020-07290-2
Abstract: Location-to-trajectory matching plays an important role in trajectory data management and analysis. In this paper, we propose and study a novel problem of privacy-preserving spatial keyword location-to-trajectory matching (PPSKLT Matching). Given a set O of…
read more here.
Keywords:
keyword;
trajectory;
privacy preserving;
trajectory matching ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "GeoInformatica"
DOI: 10.1007/s10707-021-00440-3
Abstract: Reverse top- k keyword-based location query (RT k KL), aims to find the maximum spatial region such that the query object is contained in the result of any top- k spatial keyword query with users’…
read more here.
Keywords:
based location;
keyword based;
keyword;
query ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1195-8
Abstract: As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored…
read more here.
Keywords:
keyword;
confusing keyword;
paper;
keyword based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Neurocomputing"
DOI: 10.1016/j.neucom.2020.06.150
Abstract: Abstract In abundant location-based service applications, it is necessary to process continuous spatial keyword queries over geo-textual data streaming. As an important spatial keyword query, the collective spatial keyword (CSK) query aims to find a…
read more here.
Keywords:
keyword;
spatial keyword;
index;
keyword queries ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Applied Research in Higher Education"
DOI: 10.1108/jarhe-03-2018-0047
Abstract: Purpose The purpose of this paper is to assess the efficacy of the Institute of Electrical and Electronics Engineers (IEEE) Xplore digital library search engine to return relevant materials on information visualization pedagogy literature and…
read more here.
Keywords:
keyword;
research;
search;
visualization ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2904763
Abstract: Cloud computing has become a popular approach to manage personal data for the economic savings and management flexibility in recent year. However, the sensitive data must be encrypted before outsourcing to cloud servers for the…
read more here.
Keywords:
keyword ranked;
keyword;
scheme;
multi keyword ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2905554
Abstract: Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.…
read more here.
Keywords:
scf;
keyword;
keyword search;
scf pepcks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2910828
Abstract: In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search interesting…
read more here.
Keywords:
keyword;
scheme;
multi keyword;
attribute based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2922646
Abstract: With the widespread application of the Internet of Things (IoT) technology, it is expected to become a new data management model. But IoT devices have limited resource storage and computing power, they are highly vulnerable…
read more here.
Keywords:
keyword;
scheme;
test;
attribute based ... See more keywords