共 19 条
[1]
[Anonymous], 2008, Introduction to information retrieval
[2]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[3]
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[4]
Goh E.-J., 2003, Rep. 2003/216
[5]
Efficient Similarity Search over Encrypted Data
[J].
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE),
2012,
:1156-1167
[6]
Li J., 2010, P IEEE INFOCOM, P441, DOI [DOI 10.1109/INFCOM.2010.5462196, 10.1109/INFCOM.2010.546 2196]
[7]
A Practical and Secure Multi-Keyword Search Method over Encrypted Cloud Data
[J].
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013),
2013,
:390-397
[9]
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[10]
Steinbach M, 2000, KDD WORKSH TEXT MIN, V400, P525