|
[1]Guttman, Antonin. R-trees: a dynamic index structure for spatial searching. Vol. 14. No. 2. ACM, 1984. [2]Popa, Raluca Ada, Frank H. Li, and Nickolai Zeldovich. "An ideal-security protocol for order-preserving encoding." Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013. [3]Paillier, Pascal. "Public-key cryptosystems based on composite degree residuosity classes." International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 1999. [4]Wong, Wai Kit, et al. "Secure knn computation on encrypted databases." Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM, 2009. [5]Hu, Haibo, et al. "Processing private queries over untrusted data cloud through privacy homomorphism." Data Engineering (ICDE), 2011 IEEE 27th International Conference on. IEEE, 2011. [6]Yao, Bin, Feifei Li, and Xiaokui Xiao. "Secure nearest neighbor revisited." Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, 2013. [7]Elmehdwi, Yousef, Bharath K. Samanthula, and Wei Jiang. "Secure k-nearest neighbor query over encrypted data in outsourced environments." Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE, 2014. [8]Wang, Boyang, Yantian Hou, and Ming Li. "Practical and secure nearest neighbor search on encrypted large-scale data." Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on. IEEE, 2016. [9]Xu, Rui, et al. "Privacy-preserving k-nearest neighbour query on outsourced database." Australasian Conference on Information Security and Privacy. Springer International Publishing, 2016. [10]Zhou, Lu, Youwen Zhu, and Aniello Castiglione. "Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner." Computers & Security, 2016. [11]Zhu, Youwen, Zhiqiu Huang, and Tsuyoshi Takagi. "Secure and controllable k-nn query over encrypted cloud data with key confidentiality." Journal of Parallel and Distributed Computing 89: 1-12, 2016. [12]Jonathan Katz, Y. L. "Introduction to Modern Cryptography." 2007. [13]Agrawal, Rakesh, et al. "Order preserving encryption for numeric data." Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004. [14]Boldyreva, Alexandra, et al. "Order-preserving symmetric encryption." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 2009. [15]Leutenegger, Scott T., Mario A. Lopez, and Jeffrey Edgington. "STR: A simple and efficient algorithm for R-tree packing." Data Engineering, 1997. Proceedings. 13th international conference on. IEEE, 1997. [16]Hjaltason, Gísli R., and Hanan Samet. "Distance browsing in spatial databases." ACM Transactions on Database Systems (TODS) 24.2: 265-318, 1999. [17]Henrich, Andreas. "A Distance Scan Algorithm for Spatial Access Structures." ACM-GIS. 1994. [18]Goldreich, Oded. "Foundation of cryptography (in two volumes: Basic tools and basic applications)." 2001.
|