2017
DOI: 10.1109/tifs.2017.2730365
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 75 publications
(29 citation statements)
references
References 29 publications
0
29
0
Order By: Relevance
“…13 The tree's decision-making process needs to start from the root. This is a classification method based on tree structure.…”
Section: The Common Methods Of Text Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…13 The tree's decision-making process needs to start from the root. This is a classification method based on tree structure.…”
Section: The Common Methods Of Text Classificationmentioning
confidence: 99%
“…This is a classification method based on tree structure. 13 The tree's decision-making process needs to start from the root. The data to be measured are compared with the feature node in the decision tree, and the next branch is selected according to the comparison result, until the leaf node gets the final decision result.…”
Section: The Common Methods Of Text Classificationmentioning
confidence: 99%
“…30,45 These weights are typically hidden using deterministic encryption methods. The weight of an extracted keyword can be obtained based on its importance in the document.…”
Section: One-to-many Order Preserving Symmetric Encryption (Om-opse)mentioning
confidence: 99%
“…The weight of an extracted keyword can be obtained based on its importance in the document. 30,45 These weights are typically hidden using deterministic encryption methods. 46 However, because deterministic encryption is a one-to-one mapping of plain text to cipher text, this encryption method can potentially leak some information about the documents.…”
Section: One-to-many Order Preserving Symmetric Encryption (Om-opse)mentioning
confidence: 99%
“…However, other evaluation criteria are not discussed in depth, such as the well-known consistency criterion (e.g., the inferred friend consistency) suggested in work [25]. Besides, as [26] indicates, weight plays an important role in the final evaluation results; however, we do not consider the weight of found friends in this paper for simplicity.…”
Section: Shortcoming Analysesmentioning
confidence: 99%