-
2
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
ACM Press, June
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing sql over encrypted data in the database-service-provider model," in ACM SIGMOD Conference on Management of Data, pp. 216-227, ACM Press, June 2002.
-
(2002)
ACM SIGMOD Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
6
-
-
77958484856
-
Authentic third-party data publication
-
P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, "Authentic third-party data publication," in 14th IFIP 11.3 Working Conference in Database Security, pp. 101-112, 2000.
-
(2000)
14th IFIP 11.3 Working Conference in Database Security
, pp. 101-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
8
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
A. Ceselli, E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and assessing inference exposure in encrypted databases," in ACM Transactions on Information and System Security, vol. 8, pp. 119-152, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
99 (P. Paillier, ed.), International Association for Cryptologic Research, IEE
-
"Public-key cryptosystems based on composite degree residuosity classes," in 99 (P. Paillier, ed.), vol. 1592 of LNCS, pp. 206-214, International Association for Cryptologic Research, IEE, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 206-214
-
-
-
11
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press
-
R. Rivest, L. Adleman, and M. Dertouzous, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, Academic Press, pp. 169-179, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzous, M.3
-
15
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. IT-31, pp. 469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
16
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
T. Okamoto and S. Uchiyama, "A New Public-key Cryptosystem as Secure as Factoring," EUROCRYPT, pp. 308-318, 1998.
-
(1998)
EUROCRYPT
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
18
-
-
84941151424
-
Triple-des algorith
-
N. I. of Standards and Technology, "Triple-des algorith," FIPS 46-3, 1998.
-
(1998)
FIPS
, vol.46
, Issue.3
-
-
-
19
-
-
84965066515
-
Advanced encryption standard
-
N. I. of Standards and Technology, "Advanced encryption standard," NIST FIPS PUB 197, 2001.
-
(2001)
NIST FIPS PUB
, vol.197
-
-
-
21
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Cryptographic Hardware and Embedded Systems (CHES), pp. 119-132, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems (CHES)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
24
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
J. G. Dyer, M. Lindemann, R. S. R. Perez, L. van Doom, and S. W. Smith, "Building the IBM 4758 Secure Coprocessor," in EEE Computer, pp. 57-66, 2001.
-
(2001)
EEE Computer
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.S.R.3
Van Doom, L.4
Smith, S.W.5
|