메뉴 건너뛰기




Volumn , Issue , 2005, Pages 102-111

Obfuscated databases and group privacy

Author keywords

Database privacy; Obfuscation

Indexed keywords

ACCESS CONTROL; DATABASE PRIVACY; ENCRYPTED DATABASE; OBFUSCATION;

EID: 33745784545     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102135     Document Type: Conference Paper
Times cited : (37)

References (27)
  • 1
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • In Proc. 1st International Workshop on Information Hiding, Springer
    • D. Aucsmith, Tamper resistant software: an implementation. In Proc. 1st International Workshop on Information Hiding, volume 1174 of LNCS, pages 317-333. Springer, 1996.
    • (1996) LNCS , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 2
    • 79251578513 scopus 로고    scopus 로고
    • On the (im) possibility of obfuscating programs
    • In Proc. Advances in Cryptology - CRYPTO 2001, Springer
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im) possibility of obfuscating programs. In Proc. Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 1-18. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 3
    • 0001870201 scopus 로고    scopus 로고
    • Locally random reductions: Improvements and applications
    • D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10:17-36, 1997.
    • (1997) J. Cryptology , vol.10 , pp. 17-36
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 4
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • In Proc. Advances in Cryptology - EUROCRYPT 2004, Springer
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 506-522. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 5
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • In Proc. Advances in Cryptology - CRYPTO 1997, Springer
    • R. Canetti. Towards realizing random oracles: hash functions that hide all partial information. In Proc. Advances in Cryptology - CRYPTO 1997, volume 1294 of LNCS, pages 455-469. Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 7
    • 24144487020 scopus 로고    scopus 로고
    • Towards privacy in public databases
    • In Proc. 2nd Theory of Cryptography Conference (TCC), Springer
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 363-385. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 363-385
    • Chawla, S.1    Dwork, C.2    McSherry, F.3    Smith, A.4    Wee, H.5
  • 9
    • 21144457759 scopus 로고    scopus 로고
    • White-box cryptography and an AES implementation
    • In 9th Annual International Workshop on Selected Areas in Cryptography (SAC), Springer
    • S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. White-box cryptography and an AES implementation. In 9th Annual International Workshop on Selected Areas in Cryptography (SAC), volume 2595 of LNCS, pages 250-270. Springer, 2003.
    • (2003) LNCS , vol.2595 , pp. 250-270
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.4
  • 10
    • 35248853376 scopus 로고    scopus 로고
    • A white-box des implementation for DRM applications
    • In ACM Digital Rights Management Workshop, Springer
    • S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. A white-box DES implementation for DRM applications. In ACM Digital Rights Management Workshop, volume 2696 of LNCS, pages 1-15. Springer, 2003.
    • (2003) LNCS , vol.2696 , pp. 1-15
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.4
  • 11
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 12
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Sciences, The University of Auckland, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Sciences, The University of Auckland, July 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 16
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • In Proc. Advances in Cryptology - CRYPTO 1992, Springer
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail, In Proc. Advances in Cryptology - CRYPTO 1992, volume 740 of LNCS, pages 139-147. Springer, 1993.
    • (1993) LNCS , vol.740 , pp. 139-147
    • Naor, M.1
  • 17
    • 0032265905 scopus 로고    scopus 로고
    • Auditable metering with lightweight security
    • M. Franklin and D. Malkhi. Auditable metering with lightweight security. J. Computer Security, 6(4):237-255, 1998.
    • (1998) J. Computer Security , vol.6 , Issue.4 , pp. 237-255
    • Franklin, M.1    Malkhi, D.2
  • 19
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 20
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • In Proc. Advances in Cryptology - CRYPTO 2003, Springer
    • Y. Ishai, A. Sahai, and D. Wagner. Private circuits: securing hardware against probing attacks. In Proc. Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 463-481. Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 22
    • 35048895442 scopus 로고    scopus 로고
    • Positive results and techniques for obfuscation
    • In Proc. Advances in Cryptology - EUROCRYPT 2004, Springer
    • B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 20-39, Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 23
    • 0003135570 scopus 로고
    • Partial-match retrieval algorithms
    • R. Rivest. Partial-match retrieval algorithms. SIAM Journal of Computing, 5(1):19-50, 1976.
    • (1976) SIAM Journal of Computing , vol.5 , Issue.1 , pp. 19-50
    • Rivest, R.1
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • IEEE Computer Society
    • X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In Proc. IEEE Symposium on Security and Privacy, pages 78-92. IEEE Computer Society, 2003.
    • (2003) Proc. IEEE Symposium on Security and Privacy , pp. 78-92
    • Wang, X.1    Reiter, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.