-
1
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin
-
Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin (2002) 216-227
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
2
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
Washington B.C., USA, ACM Press
-
Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM conference on Computer and communications security, Washington B.C., USA, ACM Press (2003) 93-102
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
3
-
-
84866261796
-
Anti-tamper databases: Querying encrypted databases
-
Estes Park, Colorado
-
Ozsoyoglu, G., Singer, D.A., Chung, S.S.: Anti-tamper databases: Querying encrypted databases. In: Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado (2003)
-
(2003)
Proceedings of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security
-
-
Ozsoyoglu, G.1
Singer, D.A.2
Chung, S.S.3
-
4
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Paris, France
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France (2004)
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
Boneh, D., Boyen, X.: Efficient selective-id secure identity-based encryption without random oracles. In: EUROCRYPT. (2004) 223-238
-
(2004)
EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
0023408117
-
Processing encrypted data
-
Ahituv, N., Lapid, Y., Neumann, S.: Processing encrypted data. Communications of the ACM 20 (1987) 777-780
-
(1987)
Communications of the ACM
, vol.20
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
9
-
-
26444553177
-
Encryption Schemes
-
Cambridge University Press
-
Goldreich, O.: Encryption Schemes. In: The Foundations of Cryptography. Volume 2. Cambridge University Press (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
10
-
-
0003508558
-
Advanced encryption standard (aes)
-
National Institute of Standards and Technology
-
NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
Technical Report NIST Special Publication FIPS-197
-
-
-
11
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of the ACM 45 (1998) 965-981
-
(1998)
Journal of the ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
12
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM 43 (1996) 431-473
-
(1996)
Journal of the ACM
, vol.43
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
39049088061
-
Almost optimal private information retrieval
-
San Francisco, CA, USA, Springer-Verlag
-
Asonov, D., Freytag, J.C.: Almost optimal private information retrieval. In: Second International Workshop on Privacy Enhancing Technologies PET 2002, San Francisco, CA, USA, Springer-Verlag (2002) 209-223
-
(2002)
Second International Workshop on Privacy Enhancing Technologies PET 2002
, pp. 209-223
-
-
Asonov, D.1
Freytag, J.C.2
-
14
-
-
26444497804
-
General cryptographic protocols
-
Cambridge University Press
-
Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography. Volume 2. Cambridge University Press (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
15
-
-
35248817775
-
Hiding traversal of tree structured data from untrusted data stores
-
Tucson, AZ, USA
-
Lin, P., Candan, K.S.: Hiding traversal of tree structured data from untrusted data stores. In: Proceedings of Intelligence and Security Informatics: First NSF/NIJ Symposium ISI 2003, Tucson, AZ, USA (2003) 385
-
(2003)
Proceedings of Intelligence and Security Informatics: First NSF/NIJ Symposium ISI 2003
, pp. 385
-
-
Lin, P.1
Candan, K.S.2
|