Secure similarity search over encrypted cloud images

被引:0
|
作者
Jiangsu Engineering Center of Network Monitoring, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Int. J. Secur. Appl. | / 8卷 / 1-14期
关键词
D O I
10.14257/ijsia.2015.9.8.01
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Secure Similarity Search over Encrypted Cloud Images
    Zhu, Yi
    Sun, Xingming
    Xia, Zhihua
    Xiong, Naixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 1 - 14
  • [2] Similarity Search for Encrypted Images in Secure Cloud Computing
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Yue
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1142 - 1155
  • [3] A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
    Xia, Zhihua
    Zhu, Yi
    Sun, Xingming
    Wang, Jin
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (06): : 71 - 80
  • [4] Secure Search over Encrypted Enterprise Data in the Cloud
    Wang, Kaishi
    Guo, Jiaqi
    International Journal of Network Security, 2023, 25 (01) : 103 - 112
  • [5] Survey on secure search over encrypted data on the cloud
    Hoang Pham
    Woodworth, Jason
    Salehi, Mohsen Amini
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):
  • [6] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [7] Search Over Encrypted Cloud Data With Secure Updates
    Ocansey, Selasi Kwame
    Wang, Changda
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 380 - 386
  • [8] Secure semantic expansion based search over encrypted cloud data supporting similarity ranking
    Xia, Zhihua
    Zhu, Yanling
    Sun, Xingming
    Chen, Lihong
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2014, 3 (01): : 1 - 11
  • [9] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [10] Secure Similarity Search Over Encrypted Non-Uniform Datasets
    Guo, Cheng
    Liu, Wanping
    Liu, Ximeng
    Zhang, Yinghui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2102 - 2117