-
4
-
-
3142716056
-
Order preserving encryption for numeric data
-
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order preserving encryption for numeric data. In SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
7
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In VLDB, 2002.
-
(2002)
VLDB
-
-
Bouganim, L.1
Pucheral, P.2
-
8
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
11
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
Ernesto Damiani, S. De Capitani Vimercati, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003.
-
(2003)
CCS
-
-
Damiani, E.1
De Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
33750243622
-
Lost credit data improperly kept, company admits
-
June 20
-
Eric Dash. Lost credit data improperly kept, company admits. New York Times, June 20 2005.
-
(2005)
New York Times
-
-
Dash, E.1
-
13
-
-
0019573099
-
A database encryption system with subkeys
-
G. I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with subkeys. ACM TODS, 6(2):312-328, 1981.
-
(1981)
ACM TODS
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
19
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hakan Hacigumus, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD, 2002.
-
(2002)
SIGMOD
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
21
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Hakan Hacigumus, Balakrishna R. Iyer, and Sharad Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In DASFAA, 2004.
-
(2004)
DASFAA
-
-
Hacigumus, H.1
Iyer, B.R.2
Mehrotra, S.3
-
23
-
-
85065578926
-
A privacy-preserving index for range queries
-
Bijit Hore, Sharad Mehrotra, and Gene Tsudik. A privacy-preserving index for range queries. In VLDB, 2004.
-
(2004)
VLDB
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
24
-
-
84893309371
-
A framework for efficient storage security in RDBMS
-
Bala Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in RDBMS. In EDBT, 2004.
-
(2004)
EDBT
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
26
-
-
0031378815
-
Replication is not needed: Single database computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database computationally-private information retrieval. In FOCS, 1997.
-
(1997)
FOCS
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
29
-
-
33750280396
-
Veterans chief voices anger on data theft
-
May 25
-
David Stout. Veterans chief voices anger on data theft. New York Times, May 25 2006.
-
(2006)
New York Times
-
-
Stout, D.1
-
30
-
-
29844451341
-
A small-footprint, secure database system
-
R. Vingralek. A small-footprint, secure database system. In VLDB, 2002.
-
(2002)
VLDB
-
-
Vingralek, R.1
|