Proceedings Eighth Symposium on String Processing and Information Retrieval
DOI: 10.1109/spire.2001.989778
|View full text |Cite
|
Sign up to set email alerts
|

Adding security to compressed information retrieval systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Usually, we apply two sequential operations: first, we apply data compression to save disk space and to reduce transmission costs, and second, data ciphering to provide confidentiality. This solution works fine to most applications, but we have to execute two expensive operations, and if we want to access data, we must first decipher and then decompress the ciphertext to restore information [1].…”
Section: -Introductionmentioning
confidence: 99%
“…Usually, we apply two sequential operations: first, we apply data compression to save disk space and to reduce transmission costs, and second, data ciphering to provide confidentiality. This solution works fine to most applications, but we have to execute two expensive operations, and if we want to access data, we must first decipher and then decompress the ciphertext to restore information [1].…”
Section: -Introductionmentioning
confidence: 99%