Effective error-tolerant keyword search for secure cloud computing
From MaRDI portal
Publication:458133
DOI10.1007/S11390-014-1413-1zbMATH Open1296.68046OpenAlexW1982193258MaRDI QIDQ458133FDOQ458133
Authors: Xiao-Qiong Pang, Jun-Qiang Du, Dan Xie, Bo Yang
Publication date: 7 October 2014
Published in: Journal of Computer Science and Technology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11390-014-1413-1
Recommendations
- Fuzzy keyword search and access control over ciphertexts in cloud computing
- Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage
- An improved multi-keyword fuzzy search scheme based on BloomFilter over encrypted text
- Efficient Fuzzy Search on Encrypted Data
- Multi-user keyword search scheme for secure data sharing with fine-grained access control
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cites Work
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Computing arbitrary functions of encrypted data
- Oblivious RAM Revisited
- Public Key Encryption That Allows PIR Queries
- Software protection and simulation on oblivious RAMs
This page was built for publication: Effective error-tolerant keyword search for secure cloud computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458133)