Orderpreserving encryption for numeric data, SIGMOD Conf, pp.563-574, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf
Privacy preserving keyword searches on remote encrypted data, ACNS, pp.442-455, 2005. ,
DOI : 10.1007/11496137_30
Secure knn query processing in untrusted cloud environments, IEEE TKDE, pp.2818-2831, 2014. ,
DOI : 10.1109/tkde.2014.2302434
Cloud adoption practices and priorities survey report, 2015. ,
Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017. ,
DOI : 10.1109/tdsc.2017.2693969
Secure k-nearest neighbor query over encrypted data in outsourced environments, ICDE Conf, 2014. ,
Combining fuzzy information from multiple systems, J. Comput. Syst. Sci, vol.58, issue.1, pp.83-99, 1999. ,
DOI : 10.1006/jcss.1998.1600
URL : https://doi.org/10.1006/jcss.1998.1600
Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003. ,
Secure multidimensional range queries over outsourced data, VLDB J, vol.21, issue.3, pp.333-358, 2012. ,
A privacy-preserving index for range queries, VLDB Conf, pp.720-731, 2004. ,
Inference attack against encrypted range queries on outsourced databases, ACM CODASPY, pp.235-246, 2014. ,
A privacy-preserving top-k query processing algorithm in the cloud computing, GECON Conf, pp.277-292, 2017. ,
Fast range query processing with strong privacy protection for cloud computing, vol.7, 2014. ,
Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012. ,
Top-k Query Processing Over Outsourced Encrypted Data, INRIA, 2017. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01502142
A differentially private index for range query processing in clouds, ICDE Conf, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886725
Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000. ,
Privacy-preserving top-k queries, ICDE Conf, pp.545-546, 2005. ,
Secure knn computation on encrypted databases, SIGMOD Conf, pp.139-152, 2009. ,
Top-k query processing on encrypted databases with strong security guarantees, ICDE Conf, 2018. ,