A secure kNN query processing algorithm using homomorphic encryption on outsourced database | 4 | 0.40 | 2019 |
An efficient key management scheme for user access control in outsourced databases. | 1 | 0.36 | 2017 |
A Privacy-Presering Knn Classification Algorithm Using Yao'S Garbled Circuit On Cloud Computing | 0 | 0.34 | 2017 |
Development Of A Cubrid-Based Distributed Parallel Query Processing System | 0 | 0.34 | 2017 |
Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases. | 0 | 0.34 | 2016 |
A kNN query processing algorithm using a tree index structure on the encrypted database | 2 | 0.41 | 2016 |
Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data | 7 | 0.73 | 2016 |
A Range Query Processing Algorithm Hiding Data Access Patterns In Outsourced Database Environment | 1 | 0.36 | 2016 |
A Privacy-Preserving Top-k Query Processing Algorithm in the Cloud Computing. | 0 | 0.34 | 2016 |
A New Middleware for Distributed Data Processing in CUBRID DBMS | 0 | 0.34 | 2015 |
A hierarchical CRT-based user access control scheme using resource set tree on the cloud system | 1 | 0.35 | 2015 |
A Signature-Based Data Security Technique For Energy-Efficient Data Aggregation In Wireless Sensor Networks | 4 | 0.40 | 2014 |
A New Spatial Transformation Scheme For Preventing Location Data Disclosure In Cloud Computing | 3 | 0.39 | 2014 |
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases | 0 | 0.34 | 2014 |
Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data | 10 | 0.61 | 2014 |
Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing | 1 | 0.35 | 2013 |
k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks | 5 | 0.41 | 2013 |
Performance Analysis of MapReduce-Based Distributed Systems for Iterative Data Processing Applications. | 0 | 0.34 | 2013 |
A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems. | 1 | 0.36 | 2013 |
Grid-based cloaking area creation scheme supporting continuous location-based services | 12 | 0.66 | 2012 |
A Grid-Based Cloaking Scheme for Continuous Queries in Distributed Systems | 2 | 0.39 | 2011 |
A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services | 6 | 0.49 | 2009 |
An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based Retrieval | 0 | 0.34 | 2009 |
Concurrent error detection in self-timed VLSI | 10 | 1.37 | 1994 |
VLSI implementation of a self-checking self-exercising memory system | 4 | 0.72 | 1991 |