Efficient top-k query calculation in distributed networks, Proc. of ACM PODC, pp.206-215, 2004. ,
Privacy preserving keyword searches on remote encrypted data, ACNS, pp.442-455, 2005. ,
Secure knn query processing in untrusted cloud environments, IEEE TKDE, vol.26, issue.11, pp.2818-2831, 2014. ,
Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017. ,
Secure k-nearest neighbor query over encrypted data in outsourced environments, Proc. of IEEE ICDE, pp.664-675, 2014. ,
Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003. ,
Secure multidimensional range queries over outsourced data, J. VLDB, vol.21, issue.3, pp.333-358, 2012. ,
A privacy-preserving index for range queries, VLDB, pp.720-731, 2004. ,
A privacy-preserving top-k query processing algorithm in the cloud computing, Economics of Grids, Clouds, Systems, and Services (GECON), pp.277-292, 2016. ,
Fast range query processing with strong privacy protection for cloud computing, vol.7, pp.1953-1964, 2014. ,
Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012. ,
Cryptdb: processing queries on an encrypted database. Commun, vol.55, pp.103-111, 2012. ,
Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000. ,
Privacy-preserving top-k queries, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.545-546, 2005. ,
DOI : 10.1109/icde.2005.112
Secure knn computation on encrypted databases, ACM SIGMOD, pp.139-152, 2009. ,
DOI : 10.1145/1559845.1559862
URL : http://www.cs.hku.hk/~dcheung/publication/sigmod2009-1.pdf
Top-k query processing on encrypted databases with strong security guarantees, 2016. ,