Login / Signup
Enabling secure and effective near-duplicate detection over encrypted in-network storage.
Helei Cui
Xingliang Yuan
Yifeng Zheng
Cong Wang
Published in:
INFOCOM (2016)
Keyphrases
</>
complex networks
remote server
computer networks
network model
encryption key
network structure
data storage
data transfer
neural network
response time
peer to peer
communication networks
storage requirements
network management
encryption scheme
authentication scheme