-
1
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Paris, France. ACM Press, New York
-
AGRAWAL, R., KIERNAN, J., SRIKANT, R., AND XU, Y. 2004. Order-preserving encryption for numeric data. In Proceedings of the ACM SIGMOD 2004 Conference, Paris, France. ACM Press, New York.
-
(2004)
Proceedings of the ACM SIGMOD 2004 Conference
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
Hong Kong, China. Morgan Kaufmann, San Mateo, CA
-
BOUGANIM, L. AND PUCHERAL, P. 2002. Chip-secured data access: Confidential data on untrusted servers. In Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China. Morgan Kaufmann, San Mateo, CA, 131-142.
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases
, pp. 131-142
-
-
Bouganim, L.1
Pucheral, P.2
-
4
-
-
0033904599
-
A ptas for the multiple subset sum problem with different knapsack capacities
-
CAPRARA, A., KELLERER, H., AND PFERSCHY, U. 2000. A ptas for the multiple subset sum problem with different knapsack capacities. Inf. Process. Lett. 73, 111-118.
-
(2000)
Inf. Process. Lett.
, vol.73
, pp. 111-118
-
-
Caprara, A.1
Kellerer, H.2
Pferschy, U.3
-
5
-
-
0037354149
-
A 3/4-approximation algorithm for multiple subset sum
-
CAPRARA, A., KELLERER, H., AND PFERSCHY, U. 2003. A 3/4-approximation algorithm for multiple subset sum. J. Heuristics 9, 99-111.
-
(2003)
J. Heuristics
, vol.9
, pp. 99-111
-
-
Caprara, A.1
Kellerer, H.2
Pferschy, U.3
-
6
-
-
84890410415
-
Performance evaluation of the VF graph matching algorithm
-
Venice, Italy. IEEE Computer Society Press, Los Alamitos, CA
-
CORDELLA, L., FOGGIA, P., SANSONE, C., AND VENTO, M. 1999. Performance evaluation of the VF graph matching algorithm. In Proceedings of the 10th International Conference on Image Analysis and Processing, Venice, Italy. IEEE Computer Society Press, Los Alamitos, CA.
-
(1999)
Proceedings of the 10th International Conference on Image Analysis and Processing
-
-
Cordella, L.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
7
-
-
0001097032
-
An improved algorithm for matching large graphs
-
Ischia, Italy, J. Jolion, W. Kropatsch, and M. Vente, Eds. 149-159
-
CORDELIA, L., FOGGIA, P., SANSONE, C., AND VENTO, M. 2001. An improved algorithm for matching large graphs. In Proceedings of the 3rd IAPR TC-15 Workshop on Graph-Based Representations in Pattern Recognition, Ischia, Italy, J. Jolion, W. Kropatsch, and M. Vente, Eds. 149-159.
-
(2001)
Proceedings of the 3rd IAPR TC-15 Workshop on Graph-Based Representations in Pattern Recognition
-
-
Cordelia, L.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
8
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
Washington, DC. ACM Press, New York
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2003. Balancing confidentiality and efficiency in untrusted relational dbmss. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC. ACM Press, New York.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
16644388889
-
Computing range queries on obfuscated data
-
Perugia, Italy
-
DAMIANI, E., DE CAPITANI DI VIMERCATI, S., PARABOSCHI, S., AND SAMARATI, P. 2004. Computing range queries on obfuscated data. In Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy.
-
(2004)
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
10
-
-
0019573099
-
A database encryption system with subkeys
-
DAVIDA, G., WELLS, D., AND KAM, J. 1981. A database encryption system with subkeys. ACM Trans. Database Syst. 6, 2 (June), 312-328.
-
(1981)
ACM Trans. Database Syst.
, vol.6
, Issue.2 JUNE
, pp. 312-328
-
-
Davida, G.1
Wells, D.2
Kam, J.3
-
12
-
-
0030577321
-
A new privacy homomorphism and applications
-
DOMINGO-FERRER, J. 1996. A new privacy homomorphism and applications. Inf. Process. Lett. 60, 5 (Dec.), 277-282.
-
(1996)
Inf. Process. Lett.
, vol.60
, Issue.5 DEC
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
16
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, WI. ACM Press, New York
-
HACIGÜMÜS, H., IYER, B., LI, C., AND MEHROTRA, S. 2002a. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD'2002, Madison, WI. ACM Press, New York.
-
(2002)
Proceedings of the ACM SIGMOD'2002
-
-
Hacigümüs, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
17
-
-
0036204131
-
Providing database as a service
-
San Jose, CA. IEEE Computer Society Press, Los Alamitos, CA
-
HACIGÜMÜS, H., IYER, B., AND MEHROTRA, S. 2002b. Providing database as a service. In Proceedings of the 18th International Conference on Data Engineering, San Jose, CA. IEEE Computer Society Press, Los Alamitos, CA.
-
(2002)
Proceedings of the 18th International Conference on Data Engineering
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
18
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
Springer, Jeju Island, Korea
-
HACIGÜMÜS, H., IYER, B., AND MEHROTRA, S. 2004. Efficient execution of aggregation queries over encrypted relational databases. In Proceedings of the 9th International Conference on Database Systems for Advanced Applications. Springer, Jeju Island, Korea.
-
(2004)
Proceedings of the 9th International Conference on Database Systems for Advanced Applications
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
19
-
-
84858540250
-
Performance-conscious key management in encrypted databases
-
Sitges, Catalonia, Spain. Kluwer Academic Publishers, Dordrecht
-
HACIGÜMÜS, H. AND MEHROTRA, S. 2004. Performance-conscious key management in encrypted databases. In Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Catalonia, Spain. Kluwer Academic Publishers, Dordrecht.
-
(2004)
Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Hacigümüs, H.1
Mehrotra, S.2
-
21
-
-
0024690043
-
Storing text retrieval systems on CD-ROM: Compression and encryption considerations
-
KLEIN, S., BOOKSTEIN, A., AND DEERWESTER, S. 1989. Storing text retrieval systems on CD-ROM: compression and encryption considerations. ACM Trans. Inf. Syst. 7, 3 (July), 230-245.
-
(1989)
ACM Trans. Inf. Syst.
, vol.7
, Issue.3 JULY
, pp. 230-245
-
-
Klein, S.1
Bookstein, A.2
Deerwester, S.3
-
22
-
-
0002603293
-
Practical graph isomorphism
-
MCKAY, B. 1981. Practical graph isomorphism. Congressus Numerantium 30, 45-87.
-
(1981)
Congressus Numerantium
, vol.30
, pp. 45-87
-
-
Mckay, B.1
-
23
-
-
0004218571
-
-
Ph.D. thesis, DIKU, University of Copenhagen, Copenhagen, Denmark. Report 95/1
-
PISINGER, D. 1995. Algorithms for knapsack problems. Ph.D. thesis, DIKU, University of Copenhagen, Copenhagen, Denmark. Report 95/1.
-
(1995)
Algorithms for Knapsack Problems
-
-
Pisinger, D.1
-
24
-
-
0005301490
-
Data banks and privacy homomorphisms
-
Academic Press, Orlando, FL
-
RIVEST, R., ADLEMAN, L., AND DERTOUZOS, M. 1978. Data banks and privacy homomorphisms. In Foundations of Secure Computation. Academic Press, Orlando, FL. 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
25
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
SAMARATI, P. 2001. Protecting respondent's privacy in microdata release. IEEE Trans. Knowledge Data Eng. 13, 6 (Nov./Dec.), 1010-1017.
-
(2001)
IEEE Trans. Knowledge Data Eng.
, vol.13
, Issue.6 NOV.-DEC
, pp. 1010-1017
-
-
Samarati, P.1
-
26
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA
-
SONG, D., WAGNER, D., AND PERRIG, A. 2000. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA. 44-55.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
27
-
-
0016870630
-
An algorithm for subgraph isomorphism
-
ULLMAN, J. 1976. An algorithm for subgraph isomorphism. J. ACM 23, 31-42.
-
(1976)
J. ACM
, vol.23
, pp. 31-42
-
-
Ullman, J.1
-
29
-
-
35248837336
-
Appia: Automatic storage area network fabric design
-
The USENIX Association, Monterey, CA
-
WARD, J., O'SULLIVAN, M., SHAHOUMIAN, T., AND WILKES, J. 2002, Appia: Automatic storage area network fabric design. In Proceedings of the Conference on File and Storage Technologies (FAST 2002). The USENIX Association, Monterey, CA.
-
(2002)
Proceedings of the Conference on File and Storage Technologies (FAST 2002)
-
-
Ward, J.1
O'Sullivan, M.2
Shahoumian, T.3
Wilkes, J.4
-
30
-
-
0001270387
-
Congruent graphs and the connectivity of graphs
-
WHITNEY, H. 1932. Congruent graphs and the connectivity of graphs. Am. J. Math. 54, 150-168.
-
(1932)
Am. J. Math.
, vol.54
, pp. 150-168
-
-
Whitney, H.1
|