Best position algorithms for efficient top-k query processing, Inf. Syst, vol.36, issue.6, pp.973-989, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00607882
Protecting privacy in the cloud: Current practices, future directions, IEEE Computer, vol.49, issue.2, pp.68-72, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01477714
Io-top-k: Indexaccess optimized top-k query processing, Proc. of International Conference on Very Large Databases (VLDB), pp.475-486, 2006. ,
Efficient top-k query calculation in distributed networks, Proc. of ACM PODC, pp.206-215, 2004. ,
Privacy preserving keyword searches on remote encrypted data, ACNS. pp, pp.442-455, 2005. ,
Secure knn query processing in untrusted cloud environments, IEEE TKDE, vol.26, issue.11, pp.2818-2831, 2014. ,
Crowdsourcing for top-k query processing over uncertain data, IEEE TKDE, vol.28, issue.1, pp.41-53, 2016. ,
Answering top-k queries using views, Proc. of International Conference on Very Large Databases (VLDB), pp.451-462, 2006. ,
Practical private range search revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference, pp.185-198, 2016. ,
Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017. ,
Top-k query processing in probabilistic databases with non-materialized views, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.122-133, 2013. ,
Secure k-nearest neighbor query over encrypted data in outsourced environments, Proc. of IEEE ICDE, pp.664-675, 2014. ,
Optimal aggregation algorithms for middleware, Proc. of ACM PODS, 2001. ,
Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003. ,
Fully homomorphic encryption using ideal lattices, ACM STOC, pp.169-178, 2009. ,
Top-k interesting subgraph discovery in information networks, IEEE ICDE, pp.820-831, 2014. ,
Secure multidimensional range queries over outsourced data, J. VLDB, vol.21, issue.3, pp.333-358, 2012. ,
A privacy-preserving index for range queries, Proc. of International Conference on Very Large Databases (VLDB), pp.720-731, 2004. ,
Fast top-k path-based relevance query on massive graphs, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.316-327, 2014. ,
A privacy-preserving top-k query processing algorithm in the cloud computing, Economics of Grids, Clouds, Systems, and Services (GECON), pp.277-292, 2016. ,
Fast range query processing with strong privacy protection for cloud computing, PVLDB, vol.7, issue.14, pp.1953-1964, 2014. ,
Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012. ,
Privacy-preserving top-k query processing in distributed systems, 24th International Conference on Parallel and Distributed Computing, pp.281-292, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886160
Inference attacks on property-preserving encrypted databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.644-655, 2015. ,
Distributed evaluation of top-k temporal joins, pp.1027-1039, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01266188
Cryptdb: processing queries on an encrypted database, Commun. ACM, vol.55, issue.9, pp.103-111, 2012. ,
A differentially private index for range query processing in clouds, ICDE Conf, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01886725
Efficiently monitoring top-k pairs over sliding windows, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.798-809, 2012. ,
Top-k relevant semantic place retrieval on spatial RDF data, pp.1977-1990, 2016. ,
Top-k query processing in uncertain databases, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.896-905, 2007. ,
Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000. ,
Durable top-k search in document archives, Proc. of ACM International Conference on Management of Data (SIGMOD), pp.555-566, 2010. ,
Privacy-preserving top-k queries, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.545-546, 2005. ,
Two birds with one stone: An efficient hierarchical framework for top-k and threshold-based string similarity search, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.519-530, 2015. ,
SKYPE: top-k spatialkeyword publish/subscribe over sliding window, PVLDB, vol.9, issue.7, pp.588-599, 2016. ,
Secure knn computation on encrypted databases, ACM SIGMOD, pp.139-152, 2009. ,
Top-k query processing on encrypted databases with strong security guarantees, ICDE Conf, 2018. ,
An efficient top-k query processing framework in mobile sensor networks, Data Knowl. Eng, vol.102, pp.78-95, 2016. ,