2018
DOI: 10.1109/tdsc.2016.2593444
|View full text |Cite
|
Sign up to set email alerts
|

Searchable Encryption over Feature-Rich Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 124 publications
(35 citation statements)
references
References 27 publications
0
35
0
Order By: Relevance
“…Thus, a practical SSE has to allow some information leakage in exchange for acceptable efficiency. Unfortunately, these leakages have been abused to attack SSE schemes in different ways [14,15,29,38,39]. In 2016, Zhang et al [16] proposed the file-injection attack.…”
Section: The Need For Forward Privacymentioning
confidence: 99%
“…Thus, a practical SSE has to allow some information leakage in exchange for acceptable efficiency. Unfortunately, these leakages have been abused to attack SSE schemes in different ways [14,15,29,38,39]. In 2016, Zhang et al [16] proposed the file-injection attack.…”
Section: The Need For Forward Privacymentioning
confidence: 99%
“…In [106], a privacy-preserving biometrics-based authentication solution is proposed to authenticate the users to remote service providers via zero-knowledge proof of knowledge on two secrets: an identity token encoding the biometric identifier of the user's image and a secret owned by the user. In [107], a searchable symmetric encryption over encrypted multimedia data is proposed by considering the search criteria as a high-dimensional feature vector, which is further mapped by locality sensitive hashing. The inverted file identifier vectors are encrypted by an additive homomorphic encryption or pseudo-random position permutations.…”
Section: Generating Cipher-images In Other Application Scenariosmentioning
confidence: 99%
“…Kloumann et al [24] analyzed the temporal and social profiles in app usage prediction problem. These methods of predicting mobile application usage, based on data collected from telephone handsets, are extremely valuable for predicting the way in which an app is used [25][26][27][28][29].…”
Section: Related Workmentioning
confidence: 99%