[1] Li, J., Wang, Q., Wang, C., Ren, K. and Lou, W.J. (2010) Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Proceedings of IEEE INFOCOM Mini-Conference, San Diego, 15-19 March 2010, 441-445.
[2] Hore, B., Mehrotra, S., Canim, M., and Kantarcioglu, M. (2012) Secure Multidimensional Range Queries over Outsourced Data. The VLDB Journal, 21, 333-358.
http://dx.doi.org/10.1007/s00778-011-0245-7
[3] Lin, C., Su, W.B., Meng, K., Liu, Q. and Liu, W.D. (2013) Cloud Computing Security: Architecture, Mechanism and Modeling Evaluation. Chinese Journal of Computer, 36, 1765-1784.
http://dx.doi.org/10.3724/SP.J.1016.2013.01765
[4] Cao, N., Wang, C., Li, M., Ren, K. and Lou, W.J. (2011) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. Proceedings of IEEE INFOCOM 2011, Shanghai, 10-15 April 2011, 829-837.
[5] Tebibel, T. and Kaci, A. (2015) Parallel Search over Encrypted Data under Attribute Based Encryption on the Cloud Computing. Computers & Security, in press.
http://dx.doi.org/10.1016/j.cose.2015.04.007
[6] Wang, P. and Ravishankar, C.V. (2013) Secure and Efficient Range Queries on Outsourced Databases Using R-Trees. 29th International Conference on Data Engineering (ICDE), Brisbane, 8-12 April 2013, 314-325.
[7] Wang, Z.Y., Xu,Y.R. and Guo, J. (2012) New Technologies of Intelligent Text Search. Transactions on Intelligent Systems, 7, 40-49.
[8] Wu, J.M., Han, Y.H. and Ji, D.D. (2013) Research and Design of Search Engine for Digital Works Based on Lucene. Computer Engineering & Science, 35, 166-172.
[9] Yin, Z. and Cao, J. (2012) Clouds Search Optimization Algorithm with Difference Quotient Information and Its Convergence Analysis. Computer Science, 39, 252-255.
[10] Zhou, B., Liu, Y.Q., Zhang, M., Jin, Y.J. and Ma, S.P. (2011) Incorporating Web Browsing Activities into Anchor Texts for Web. Information Retrieval, 14, 290-314.
http://dx.doi.org/10.1007/s10791-010-9151-7
[11] Zhang, P. and Wang, J.Z. (2014) An Improved Efficient Search Method Based on Big Data. Application Research of Computer, 31, 2331-2333.
[12] Fang, Z.J., Zhou, S. and Xia, Z.H. (2015) Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords. Computer Science, 42, 136-139.
[13] Huang, R.W., Gui, X.L., Chen, N.J. and Yao, J. (2015) Encryption Algorithm Supporting Relational Calculations in Cloud Computing. Journal of Software, 26, 1181-1195. (In Chinese)
http://www.jos.org.cn/1000-9825/4656.htm