Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Searchable symmetric encryption: Designs and challenges
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
Sok: Cryptographically protected database search
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …
writing to, and administering the database. This separation limits unnecessary administrator …
Geometric range search on encrypted spatial data
Geometric range search is a fundamental primitive for spatial data analysis in SQL and
NoSQL databases. It has extensive applications in location-based services, computer-aided …
NoSQL databases. It has extensive applications in location-based services, computer-aided …
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
With the prevalence of the cloud computing, data owners can outsource their data to the
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …
Secure skyline queries on cloud platform
Outsourcing data and computation to cloud server provides a cost-e ective way to support
large scale data storage and query processing. However, due to security and privacy …
large scale data storage and query processing. However, due to security and privacy …
Circular range search on encrypted spatial data
Searchable encryption is a promising technique enabling meaningful search operations to
be performed on encrypted databases while protecting user privacy from untrusted third …
be performed on encrypted databases while protecting user privacy from untrusted third …
Graphse²: An encrypted graph database for privacy-preserving social search
In this paper, we propose GraphSE\textsuperscript2, an encrypted graph database for online
social network services to address massive data breaches. GraphSE\textsuperscript2 …
social network services to address massive data breaches. GraphSE\textsuperscript2 …
Secure and efficient skyline queries on encrypted data
Outsourcing data and computation to cloud server provides a cost-effective way to support
large scale data storage and query processing. However, due to security and privacy …
large scale data storage and query processing. However, due to security and privacy …
Sorting and searching behind the curtain
We propose a framework where a user can outsource his data to a cloud server in an
encrypted form and then request the server to perform computations on this data and sort the …
encrypted form and then request the server to perform computations on this data and sort the …