[1] |
LARS George.HBase: The Definitive Guide[M]. DAI Zhiyuan, LIU Jia, JIANG Jie. : Posts and Telecom Press, 2013.
|
|
LARS George.HBase权威指南[M].代志远,刘佳,蒋杰,译.北京:人民邮电出版社,2013.
|
[2] |
CUI Dan, SHI Jinxin.Implementation of HBase Secondary Index Based on Redis[J]. Computer Engineering & Software, 2016, 37(11): 64-67.
|
|
崔丹,史金鑫.基于Redis实现HBase二级索引的方法[J].软件,2016,37(11):64-67.
|
[3] |
XI Xiaofeng, CAO Baoxiang.An Improved Fully Homomorphic Encryption Scheme under Conditions of Cloud Computing[J]. Computer Technology and Development, 2015, (2): 144-147.
|
|
锡晓峰,曹宝香.一种适用于云计算环境的改进全同态加密方案[J]. 计算机技术与发展,2015,(2):144-147.
|
[4] |
HUANG Q C.Research on Ciphertext Index Method for Relational Database[C]//IEEE. 2009 2nd IEEE International Conference on Computer Science and Information Technology, August 8-11, 2009, Beijing, China. New York: IEEE, 2009: 445-449.
|
[5] |
DAWN Xiaoding, SONG D, WAGNER A P.Practical Techniques for Searches on Encrypted Data[C]//IEEE. Proceeding 2000 IEEE Symposium on Security and Privacy. May 14-17, 2000, Berkeley, CA, USA. New York: IEEE, 2010: 44-55.
|
[6] |
GOH E J. Secure Indexes[EB/OL]. , 2019-8-15.
|
[7] |
CURTMOLA R, GARAY J, KAMARA S, et al.Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions[J]. Journal of Computer Security, 2011, 19(5): 895-934.
|
[8] |
CASH D, JARECKI S, JUTLA C, et al. Highly-scalable Searchable Symmetric Encryption with Support for Boolean Queries[EB/OL]. , 2019-8-15.
|
[9] |
KAMARA S, MOATAZ T. Boolean Searchable Symmetric Encryption with Worst-case Sub-linear Complexity[EB/OL]. , 2019-8-15.
|
[10] |
BONEH D, CRESCENZO G D, OSTROVSKY R, et al.Public Key Encryption with Keyword Search[C]//Springer. Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Interlaken, Switzerland. Berlin, Heidelberg: Springer, 2004: 506-522.
|
[11] |
XU P, TANG X, WANG W, et al.Fast and Parallel Keyword Search over Public-key Ciphertexts for Cloud-assisted IoT[J]. IEEE Access, 2017, 5(99): 24775-24784.
|
[12] |
CHANG Y C, MITZENMACHER M.Privacy Preserving Keyword Searches on Remote Encrypted Data[C]//Springer. International Conference on Applied Cryptography and Network Security, June 7-10, 2005, New York, NY, USA. Berlin, Heidelberg: Springer, 2005: 442-455.
|
[13] |
CAO N, WANG C, LI M, et al.Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233.
|
[14] |
YANG Yang, LIU Jia, CAI Shengwei, et al.Fast Multi-Keyword Semantic Ranked Search in Cloud Computing[J]. Chinese Journal of Computers, 2018, 41(6): 1346-1359.
|
|
杨旸,刘佳,蔡圣暐,等.云计算中保护数据隐私的快速多关键词语义排序搜索方案[J].计算机学报,2018,41(6): 1346-1359.
|
[15] |
LI J, CHEN S C, SONG D J.Security Structure of Cloud Storage Based on Homomorphic Encryption Scheme[C]//IEEE. International Conference on Cloud Computing and Intelligence Systems, October 30-November 11, 2012, Hangzhou, China. New Jersey: IEEE, 2012: 224-227.
|
[16] |
CHENG Shuai, YAO Hanbing.Study of Cipher Text Retrieval Based on Homomorphic Encryption[J]. Computer Science, 2015, 42(6A): 413-416.
|
|
程帅,姚寒冰.基于同态加密的密文全文检索技术的研究[J].计算机科学, 2015, 42(6A):413-416.
|
[17] |
FU Wei, LI Moci, ZHAO Huarong, et al.CRSHE: A Novel Ciphertext Retrieval Scheme Based on Homomorphic Encryption[J]. Computer Engineering and Science, 2018, 40(9): 1540-1545.
|
|
付伟,李墨泚,赵华容,等. CRSHE:基于同态加密的新型密文检索方案[J].计算机工程与科学, 2018, 40(9): 1540-1545.
|
[18] |
CUI Chen, ZHENG Linjiang, HAN Fengping, et al.Design of Secondary Indexes in HBase Based on Memory[J]. Journal of Computer Applications, 2018, 38(6): 1584-1590.
|
|
崔晨,郑林江,韩凤萍,等.基于内存的HBase二级索引设计[J].计算机应用,2018,38(6):1584-1590.
|
[19] |
DING Fei, CHEN Changsong, ZHANG Tao, et al.Research and Implementation of Coprocessor Based HBase Region-level Secondary Index[J]. Journal of Computer Applications, 2014, (z1): 181-185.
|
|
丁飞,陈长松,张涛,等.基于协处理器的HBase区域级第二索引研究与实现[J].计算机应用, 2014,(z1):181-185.
|
[20] |
RIVEST R, ADLEMAN L, DERTOUZOS M.On Data Banks and Privacy Homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11): 169-180.
|
[21] |
LI Lang, YU Xiaozhong, YANG Yaqiong, et al.Survey on Homomorphic Encryption Technology[J]. Application Research of Computers, 2015, (11): 3209-3214.
|
|
李浪,余孝忠,杨娅琼,等.同态加密研究进展综述[J].计算机应用研究, 2015,(11):3209-3214.
|
[22] |
GENTRY C.A Fully Homomorphic Encryption Scheme[M]. Stanford: Stanford University, 2009.
|
[23] |
DIJK M V, GENTRY C, HALEVI S, et al.Fully Homomorphic Encryption over the Integers[C]//Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-Jun 3, 2010, French Riviera France. New York: ACM, 2010: 24-43.
|
[24] |
GRUSS , RICHARD C, et al. Solr Team Project Report[EB/OL]. , 2019-8-15.
|
[25] |
HOWGRAVE G N.Approximate Integer Common divisors[M]. Berlin Heidelberg: Springer, 2001: 51-66.
|