[1] |
TANG J , CUI Y , LI Q ,et al. Ensuring security and privacy preservation for cloud data services[J]. Acm Computing Surveys, 2016,49(1): 1-39.
|
[2] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security & Privacy. 2002: 44-55.
|
[3] |
LI H W , LIU D X , DAI Y S ,et al. Engineering searchable encryption of mobile cloud networks:when QoE meets QoP[J]. IEEE Wireless Communications, 2015,22(4): 74-80.
|
[4] |
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005: 442-455.
|
[5] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[6] |
DAN B , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522.
|
[7] |
李经纬, 贾春福, 刘哲理 ,等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128.
|
|
LI J W , JIA C F , LIU Z L ,et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128.
|
[8] |
CUI J , ZHOU H , ZHONG H ,et al. AKSER:attribute-based keyword search with efficient revocation in cloud computing[J]. Information Sciences, 2017,423: 343-352.
|
[9] |
ZHAO F , YAN F W , JIN H ,et al. Personalized mobile searching approach based on combining content-based filtering and collaborative filtering[J]. IEEE Systems Journal, 2017,11(1): 324-332.
|
[10] |
LEUNG W T , LEE D L , LEE W C . PMSE:a personalized mobile search engine[J]. IEEE Transactions on Knowledge & Data Engineering, 2013,25(4): 820-834.
|
[11] |
FU Z J , REN K , SHU J G ,et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(9): 2546-2559.
|
[12] |
FU Z J , WU X L , WANG Q ,et al. Enabling central keyword-based semantic extension search over encrypted outsourced data[J]. IEEE Transactions on Information Forensics & Security, 2017,12(12): 2986-2997.
|
[13] |
ALHABASHNEH O , IQBAL R , DOCTOR F ,et al. Fuzzy rule based profiling approach for enterprise information seeking and retrieval[J]. Information Sciences, 2017,(394-395): 18-37.
|
[14] |
ZHANG Q , WANG G J , LIU Q . Enabling cooperative privacy-preserving personalized search in cloud environments[J]. Information Sciences, 2019,480: 1-13.
|
[15] |
WONG W K , CHEUNG W L , KAO B ,et al. Secure kNN computation on encrypted databases[C]// ACM SIGMOD International Conference on Management of Data. 2009: 139-152.
|
[16] |
张强, 王国军 . 个性化搜索中一种基于位置服务的隐私保护方法[J]. 电子与信息学报, 2018,40(8): 1998-2005.
|
|
ZHANG Q , WANG G J . Privacy preserving method based on location service in personalized search[J]. Journal of Electronics & Information Technology, 2018,40(8): 1998-2005.
|
[17] |
DU Q , XIE H R , CAI Y ,et al. Folksonomy-based personalized search by hybrid user profiles in multiple levels[J]. Neurocomputing, 2016,204(C): 142-152.
|
[18] |
MILLER G A , . WordNet:a lexical database for english[C]// Communications of the ACM. 1995,2(11): 39-41.
|
[19] |
D’ORAZIO C J , CHOO K K R . A technique to circumvent SSL/TLS validations on iOS devices[J]. Future Generation Computer Systems, 2017,74: 366-374.
|
[20] |
OPPLIGER R , HAUSER R , BASIN D . SSL/TLS session-aware user authentication[J]. Computers & Security, 2008,27(3-4): 64-70.
|
[21] |
LUO E T , LIU Q , ABAWAJY J H ,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks[J]. Future Generation Computer Systems, 2017,68: 222-233.
|
[22] |
ZHANG Q , LIU Q , WANG G J . PRMS:A personalized mobile search over encrypted outsourced data[J]. IEEE Access, 2018,6: 31541-31552.
|
[23] |
吴志强, 李肯立, 郑蕙 . 高效可扩展的对称密文检索架构[J]. 通信学报, 2017,38(8): 79-93.
|
|
WU Z Q , LI K L , ZHENG H . Efficient and scalable architecture for searchable symmetric encryption[J]. Journal on Communications, 2017,38(8): 79-93.
|
[24] |
GOSMAN C , CORNEA T , DOBRE C ,et al. Controlling and filtering users data in intelligent transportation system[J]. Future Generation Computer Systems, 2016,78: 807-816.
|
[25] |
WANG T , LI Y , CHEN Y ,et al. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017,21(11): 2532-2535.
|
[26] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed systems, 2014,25(1): 222-233.
|