Privacy-Preserving Query Protocols Over Encrypted Graphs in the Cloud
Outline 1 Background 2 Shortest Distance Query 3 Top-k Nearest Keyword Query 4 Constrained Shortest Distance Query 5 Conclusion Cloud Storage Big Database Graph Data Social Networks Communications Networks Traffic Network Gene Graph Web crawlers ……Outsourced Graphs Graph database
Liehuang Zhu
School of Computer Science and Technology Beijing Institute of Technology
国内会议
西安
英文
1-46
2017-09-01(万方平台首次上网日期,不代表论文的发表时间)