[1] |
ATZORI L , IERA A , MORABITO G . The Internet of things:a survey[J]. Computer Networks, 2010,54(15): 2787-2805.
|
[2] |
AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[C]// ACM SIGMOD International Conference on Management of Data. 2004: 563-574.
|
[3] |
AGRAWAL D , ABBADI A E , EMEKCI F ,et al. Database management as a service:challenges and opportunities[C]// International Conference on Data Engineering. 2009: 1709-1716.
|
[4] |
KADHEM H , AMAGASA T , KITAGAWA H . A secure and efficient order preserving encryption scheme for relational databases[C]// The International Conference on Knowledge Management and Information Sharing Valencia. 2010: 25-35.
|
[5] |
LIU D , WANG S . Programmable order-preserving secure index for encrypted database query[C]// International Conference on Cloud Computing. 2012: 502-509.
|
[6] |
LEE S , TAE-JUN P , LEE D ,et al. Chaotic order preserving encryption for efficient and secure queries on databases[J]. IEICE Transactions on Information & Systems, 2009,92-D(11): 2207-2217.
|
[7] |
SHI E , BETHENCOURT J , CHAN T H H ,et al. Multi-dimensional range query over encrypted data[C]// 2007 IEEE Symposium on Security and Privacy. 2007: 350-364.
|
[8] |
POPA R A , REDFIELD C M S , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// ACM Symposium on Operating Systems Principles. 2011: 85-100.
|
[9] |
GAO Y , MIAO M , WANG J ,et al. Secure approximate nearest neighbor search over encrypted data[C]// Ninth International Conference on Broadband and Wireless Computing Communication and Applications. 2014: 578-583.
|
[10] |
TANG Q , . Privacy preserving mapping schemes supporting comparison[C]// The 2010 ACM Workshop on Cloud Computing Security Workshop. 2010: 53-58.
|
[11] |
WANG C , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// International Conference on Distributed Computing System. 2010: 253-262.
|
[12] |
DING Y , KLEIN K . Model-driven application-level encryption for the privacy of e-health data[C]// Ares’10 International Conference on Availability Reliability and Security. 2010: 341-346.
|
[13] |
FURUKAWA J . Request-based comparable encryption[M]. Computer Security–ESORICS. 2013: 129-146.
|
[14] |
FURUKAWA J , . Short comparable encryption[C]// International Conference on Cryptology and Network Security. 2014: 337-352.
|
[15] |
ZOU Q , WANG J , YE J ,et al. Efficient and secure encrypted image search in mobile cloud computing[J]. Soft Computing, 2016: 1-11.
|
[16] |
ZHU Y , LIU L , CHEN X . Efficient first-price sealed-bid auction protocols from modified comparable encryption[C]// International Conference on Broadband and Wireless Computing,Communication and Applications. 2015: 417-421.
|
[17] |
GUO Z , FU Y , CAO C . Secure first-price sealed-bid auction scheme[J]. EURASIP Journal on Information Security, 2017,2017(1): 16.
|
[18] |
CHEN P , YE J , CHEN X . A new efficient request-based comparable encryption scheme[C]// International Conference on Advanced Information Networking and Applications Workshops. 2015: 436-439.
|
[19] |
KO?C K . Analysis of sliding window techniques for exponentiation[J]. Computers & Mathematics with Applications, 1995,30(10): 17-24.
|