2022
DOI: 10.1109/tsc.2020.3020688
|View full text |Cite
|
Sign up to set email alerts
|

Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 33 publications
0
23
0
Order By: Relevance
“…Recently several approaches, such as K-anonymity [29], [30], blockchain [31]- [34], differential privacy [10], federated learning [8] and edge of computing [35], and cryptographic methods [8], [9], [36]- [38] have been proposed to protect the users' privacy in an MCS. For example, Wang et al [10], [39] propose a framework for protecting the users' location privacy during task distribution based on geolocation obfuscation, and also introduce diferential privacy techniques to protect users' privacy in an MCS.…”
Section: Related Workmentioning
confidence: 99%
“…Recently several approaches, such as K-anonymity [29], [30], blockchain [31]- [34], differential privacy [10], federated learning [8] and edge of computing [35], and cryptographic methods [8], [9], [36]- [38] have been proposed to protect the users' privacy in an MCS. For example, Wang et al [10], [39] propose a framework for protecting the users' location privacy during task distribution based on geolocation obfuscation, and also introduce diferential privacy techniques to protect users' privacy in an MCS.…”
Section: Related Workmentioning
confidence: 99%
“…Inner products are also used in secure similarity measure protocols such as secure multi-keyword searchable schemes [42], secure keyword similarity [43], similar document detection for plagiarism prevention, copyright protection and duplicate submission detection (where similar documents between two entities should be detected while keeping documents confidential [40,46]), or secure profile proximity matching in social networks (e.g. in some applications, a user profile is defined as a vector of integers where attributes correspond to an interest; social proximity is defined as dot product of two user's vectors [26].…”
Section: Applicationsmentioning
confidence: 99%
“…Data collection is the most important function in WSNs. A large amount of data forms the basis of various applications [41], [42]. With the development of artificial intelligence technology, more potential value can be obtained from a large amount of data, which promotes the widespread application of IoT devices [31], [32].…”
Section: Related Workmentioning
confidence: 99%