-
2
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th IEEE Symposium on Foundations of Computer Science. (1995) 41-50
-
(1995)
Proceedings of the 36th IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
3
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. (2002) 216-227
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of CCS'03. (2003) 93-102
-
(2003)
Proceedings of CCS'03
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. (2004) 563-574
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
9
-
-
33750722191
-
A structure preserving database encryption scheme
-
Elovici, Y., Waisenberg, R., Shmueli, E., Gudes, E.: A structure preserving database encryption scheme. In: Secure Data Management. (2004) 28-40
-
(2004)
Secure Data Management
, pp. 28-40
-
-
Elovici, Y.1
Waisenberg, R.2
Shmueli, E.3
Gudes, E.4
-
10
-
-
85034638281
-
Encrypting problem instances, or ..., can you take advantage of someone without having to trust him?
-
Feigenbaum, J.: Encrypting problem instances, or ..., can you take advantage of someone without having to trust him? In: Proceedings of CRYPTO'85. (1986) 477-488
-
(1986)
Proceedings of CRYPTO'85
, pp. 477-488
-
-
Feigenbaum, J.1
-
11
-
-
84965066515
-
Advanced encryption standard
-
Computer Security Resource Center, National Institute of Standards and Technology
-
AES: Advanced encryption standard. FIPS 197, Computer Security Resource Center, National Institute of Standards and Technology (2001)
-
(2001)
FIPS
, vol.197
-
-
-
12
-
-
0003508570
-
Data encryption standard
-
Federal Information Processing Standards Publication
-
DES: Data encryption standard. FIPS PUB 46, Federal Information Processing Standards Publication (1977)
-
(1977)
FIPS PUB
, vol.46
-
-
-
13
-
-
0032178375
-
Fast and scalable layer four switching
-
Srinivasan, V., Varghese, G., Suri, S., Waldvogel, M.: Fast and scalable layer four switching. In: Proceedings of ACM SIGCOMM'98. (1998) 191-202
-
(1998)
Proceedings of ACM SIGCOMM'98
, pp. 191-202
-
-
Srinivasan, V.1
Varghese, G.2
Suri, S.3
Waldvogel, M.4
-
14
-
-
26444533143
-
Efficiency and security trade-off in supporting range queries on encrypted databases
-
College of Computing, Georgia Institute of Technology
-
Li, J., Omiecinski, E.R.: Efficiency and security trade-off in supporting range queries on encrypted databases. Technical Report GIT-CC-05-01, College of Computing, Georgia Institute of Technology (2005) Available at ftp://ftp.cc.gatech.edu/pub/coc/tech.reports/2005/GIT-CC-05-01.pdf.
-
(2005)
Technical Report
, vol.GIT-CC-05-01
-
-
Li, J.1
Omiecinski, E.R.2
-
15
-
-
84904883732
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In: Proceedings of the 10th IEEE International Conference on Network Protocols. (2002) 280-289
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols
, pp. 280-289
-
-
Xu, J.1
Fan, J.2
Ammar, M.H.3
Moon, S.B.4
|