Paper Title:
Study of Streamline Dynamic Successive Trees Index Model for Ciphertext
  Abstract

Secure index is the core technology in the full-ciphertext retrieval. In order to appliance the efficient full-text retrieval in the ciphertext state, a streamline dynamic successive trees of ciphertext(SDSTC)index model is proposed. The SDSTC index model which supports queries of substring and dynamic updating of index, has a high recall and precision ratio in retrieval. Giving algorithms of model index creation, retrieval and ciphertext index updating and the analysis of its security and efficiency. Compared with other existing index models, experiments show that the SDSTC index model has good time efficiency and more suitable for areas of ciphertext security of full-text retrieval

  Info
Periodical
Key Engineering Materials (Volumes 480-481)
Edited by
Yanwen Wu
Pages
908-915
DOI
10.4028/www.scientific.net/KEM.480-481.908
Citation
L. Huo, D. S. Li, Y. L. Tan, X. Xing, X. Z. Zou, "Study of Streamline Dynamic Successive Trees Index Model for Ciphertext", Key Engineering Materials, Vols. 480-481, pp. 908-915, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zhi Qiang Xie, Jing Yang, Yu Jing He, Guang Jie Ye
Abstract:Aiming at the dynamic integrated scheduling problem of complex multi-products with different arriving time and identical machines, an...
897
Authors: Zhong Ping Zhang, Yong Xin Liang
Abstract:This paper proposes a new data stream outlier detection algorithm SODRNN based on reverse nearest neighbors. We deal with the sliding window...
1032
Authors: Zong Hui Wang, Shu Su Shi, Li Cheng Yu, Wen Zhi Chen
Chapter 16: Geographic Information and Remote Sensing Science
Abstract:FCD-based traffic navigation system is getting more and more attention from countries all over the world. Shortest path algorithm is one of...
2880
Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Xi Rong Bao, Jin Liu, Li Huang She, Shi Zhang
Chapter 7: Communication and Information Technology
Abstract:Chaotic encryption algorithm is simple, fast speed, no more memory, and suitable for using in wireless sensor networks (WSNs). This paper...
798