Computer and Modernization ›› 2022, Vol. 0 ›› Issue (02): 85-91.
Previous Articles Next Articles
Online:
2022-03-31
Published:
2022-03-31
XU Hui, TIE Zhi-xin, SHU Ying. Fast Dimensionality Reduction Sorting Search Method Based on Feature Matching[J]. Computer and Modernization, 2022, 0(02): 85-91.
[1] | HASHIZUME K, ROSADO D G, FEMANDEZ M E, et al. An analysis of security issues for cloud computing[J]. Journal of Internet Services & Applications, 2013,4(1):1-13. |
[2] | CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,25(1):829-837. |
[3] | SUN W H, WANG B CAO N, et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Parallel and Distributed Technology Systems and Applications, 2013,25(11):3025-3035. |
[4] | LIU L G, LIU Z J. A novel fast dimension-reducing ranked query method with high security for encrypted cloud data[J]. Chinese Journal of Electronics, 2020,29(2):344-350. |
[5] | BALLARD L, KAMARA S, MONROSE F. Achieving efficient conjunctive keyword searches over encrypted data [C]// Proceedings of the 7th International Conference on Information and Communications Security. 2005:414-426. |
[6] | LI M, YU S C, CAO N, et al. Authorized private keyword search over encrypted data in cloud computing[C]// Proceedings of the 2011 31st International Conference on Distributed Computing Systems. 2011:383-392. |
[7] | CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1):222-233. |
[8] | MURATA M, NAGANO H, MUKAI R, et al. BM25 with exponential IDF for instance search[J]. IEEE Transactions on Multimedia, 2014,16(6):1690-1699. |
[9] | SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. 2000:44-55. |
[10] | CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934. |
[11] | LI R X, XU Z Y, KANG W S, et al. Efficient multi-keyword ranked query over encrypted data in cloud computing[J]. Future Generation Computer Systems, 2014,30:179-190. |
[12] | WANG J F, CHEN X F, MA H, et al. A verifiable fuzzy keyword search scheme over encrypted data[J]. Journal of Internet Services and Information Security, 2012,2(1/2):49-58. |
[13] | XIA Z H, WANG X H, SUN X M, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2):340-352. |
[14] | FU Z J, WU X L, GUAN C W, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12):2706-2716. |
[15] | WAN Z G, DENG R H. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(6) :1083-1095. |
[16] | YANG Y, LIN H R, LIU X M, et al. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment[J]. IEEE Access, 2019, 7:140818-140832. |
[17] | LIU Q, TIAN Y, WU J, et al. Enabling verifiable and dynamic ranked search over outsourced data[J]. IEEE Transactions on Services Computing, 2019. |
[18] | ZHANG W, LIN Y P, GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2018,6(1) :74-86. |
[19] | GOH E J. Secure indexes[EB/OL]. (2003-11-07) [2021-05-01]. https://crypto.stanford.edu/portia/pubs/articles/G1448527409.html. |
[20] | RAYKOVA M, VO B, BELLOVIN S M, et al. Secure anonymous database search[C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 2009:115-126. |
[21] | CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005:442-455. |
[22] | CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934. |
[23] | GUAN Z T, LIU X Y, WU L F, et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data[J]. Information Sciences, 2020,514:523-540. |
[24] | 戴奇林,杨凡. 基于K-L变换的iris数据分类[J]. 农家参谋, 2018(12):213. |
[25] | 罗刚. 解密搜索引擎技术实战:Lucene&Java 精华版[M]. 北京:电子工业出版社, 2011:401-405. |
[1] | JIANG Yu-hang, ZHANG Xin-you. Ethereum-based Medical Healthy Data Sharing System [J]. Computer and Modernization, 2023, 0(02): 110-115. |
[2] | Non-saliency Feature Image Registration Algorithm Based on Local Overlapping Region. YANG Xu-zhao, LEI Zhi-yong, WANG Jiao-jiao [J]. Computer and Modernization, 2023, 0(01): 24-29. |
[3] | ZHANG Bin, LI Da-peng, JIANG Rui, WANG Xiao-ming. An Off-chain Extended Storage Scheme for Blockchain Traceability [J]. Computer and Modernization, 2022, 0(10): 106-112. |
[4] | DU Xin-chang, GAO Yu-xiang, CAO Yuan-jie, ZHANG Hao, LIU Hai-bo. Improved Image Encryption Algorithm Based on Chaotic Equation and Compressed Sensing Theory [J]. Computer and Modernization, 2022, 0(04): 115-120. |
[5] | ZHANG Li, LUO Chun-shan, XIE Wei-yuan, LI Bei-bei. Adaptive Encryption Method for Private Database Based on Branch Obfuscation Algorithm [J]. Computer and Modernization, 2022, 0(03): 43-47. |
[6] | LIU kun, ZENG Xi, QIU Zi-heng, CHEN Zhou-guo, . Text Clustering Algorithm Based on RoBERTa-WWM and HDBSCAN [J]. Computer and Modernization, 2022, 0(03): 48-52. |
[7] | ZHANG Xiao-min. An Attribute-based Multi-keyword Searchable Scheme Based on Bloom Filters [J]. Computer and Modernization, 2021, 0(08): 104-111. |
[8] | LI Zhi-yi, WANG Xue-ming, WANG Ze-xian. A Dynamic Public Key Searchable Encryption Scheme Against Keyword Guessing Attack [J]. Computer and Modernization, 2021, 0(06): 100-106. |
[9] | GAO Guo-jing, LYU Qing-wen. Robust Medical Image Encryption Algorithm Based on Compound Chaos [J]. Computer and Modernization, 2021, 0(06): 107-112. |
[10] | GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi. A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix [J]. Computer and Modernization, 2021, 0(06): 113-119. |
[11] | YAO Xiao-lu, ZHANG Guo-you, WANG Jiang-fan, CUI Jian. Blind Watermarking Algorithm of 3D Mesh Models Based on Logistic Chaotic Encryption [J]. Computer and Modernization, 2021, 0(06): 120-126. |
[12] | DENG Yin-juan, DU Hong-zhen, DOU Xiao-xia. Registered Users Public Key Searchable Encryption Scheme with Secure-channel Free [J]. Computer and Modernization, 2020, 0(09): 43-48. |
[13] | CAO Yong-ming. A Fuzzy Keyword Search Encryption Scheme Without Secure Channel [J]. Computer and Modernization, 2020, 0(04): 42-. |
[14] | ZUO Peng, HE Zhi-mou, YUAN Meng, ZHANG Hai-kuo, YANG Wei-ping. Identifier Resolution Model Based on Encryption Transmission [J]. Computer and Modernization, 2020, 0(04): 46-. |
[15] | QIN Lu-lu, ZHOU Li-jing, WANG Min. A Conditional Proxy Re-encryption Supporting Multi-keyword Search [J]. Computer and Modernization, 2020, 0(01): 100-. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||