共 38 条
[1]
Querying Encrypted Data
[J].
SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2014,
:1259-1261
[2]
Arasu A, 2015, PROC INT CONF DATA, P435, DOI 10.1109/ICDE.2015.7113304
[3]
Bajaj S., 2011, SIGMOD, P205, DOI DOI 10.1145/1989323.1989346
[5]
Chang Z, 2016, PROC VLDB ENDOW, V9, P1113, DOI 10.14778/2994509.2994528
[6]
Chen H, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2111
[7]
SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform
[J].
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020),
2020,
:253-264
[8]
Flath DanielD., 1988, INTRO NUMBER THEORY
[9]
Ghinita G., 2008, SIGMOD, P121, DOI [DOI 10.1145/1376616.1376631, 10.1145/1376616.1376631]
[10]
Gong Z, 2022, IEEE T DEPEND SECURE