-
1
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
Hong Kong, China
-
L. Bouganim and P. Pucheral, "Chip-secured data access: Confidential data on untrusted servers", Proc. of the 28th International Conference on Very Large Data Bases, Hong Kong, China, 2002, pp. 131-142.
-
(2002)
Proc. of the 28th International Conference on Very Large Data Bases
, pp. 131-142
-
-
Bouganim, L.1
Pucheral, P.2
-
2
-
-
0004190705
-
-
Addison-Wesley
-
S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
3
-
-
33645961675
-
Rethinking Database System, Architecture: Towards a Self-tuning RISC-style Database System
-
S. Chaudhuri, G. Weikum, "Rethinking Database System, Architecture: Towards a Self-tuning RISC-style Database System", Int. Conf. on VLDB, 2000.
-
(2000)
Int. Conf. on VLDB
-
-
Chaudhuri, S.1
Weikum, G.2
-
4
-
-
18744366643
-
-
E. Damiani, S. De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs, CCS'03, Washington, DC, USA, 2003.
-
E. Damiani, S. De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs", CCS'03, Washington, DC, USA, 2003.
-
-
-
-
5
-
-
0019573099
-
A Database Encryption, System with Subkeys
-
G.I. Davida, D.L. Wells, and J.B. Kam, "A Database Encryption, System with Subkeys", ACM Trans. Database Syst., 1981, pp. 312-328.
-
(1981)
ACM Trans. Database Syst
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
6
-
-
0017018484
-
New Directions, in Cryptography
-
W. Diffie and M. E. Hellman, "New Directions, in Cryptography", IEEE Trans. Inform. Theory, 1976, IT-22:644-654.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
0029478393
-
A Two-Phase Encryption Scheme for Enhancing Database Security
-
M.S. Hwang, and W.P. Yang, "A Two-Phase Encryption Scheme for Enhancing Database Security", J. Systems and Software, 1995, 31(12); 257-265.
-
(1995)
J. Systems and Software
, vol.31
, Issue.12
, pp. 257-265
-
-
Hwang, M.S.1
Yang, W.P.2
-
11
-
-
0001632721
-
Pseudo-random number generators: In cryptography and number theory
-
J. C. Lagarias, "Pseudo-random number generators: in cryptography and number theory", American Mathematical Society, 1990, pp. 115-143.
-
(1990)
American Mathematical Society
, pp. 115-143
-
-
Lagarias, J.C.1
-
13
-
-
34547660034
-
-
W. Rank1 and W. Effing, Smart Card Handbook, John Wiley & Sons Ltd, 1997.
-
W. Rank1 and W. Effing, Smart Card Handbook, John Wiley & Sons Ltd, 1997.
-
-
-
-
14
-
-
0017930809
-
A method for obtaining digit signatures and public-key cryptosystems
-
L. A. R. Rivest, A. Shamir, "A method for obtaining digit signatures and public-key cryptosystems", Communications of the ACM, Date, pp. 120-126.
-
Communications of the ACM, Date
, pp. 120-126
-
-
Rivest, L.A.R.1
Shamir, A.2
-
15
-
-
0004196798
-
On digit signatures and public key cryptosystems
-
Technical Report MIT/LCS/TR-212, MIT, Laboratory for Computer Science, Location, 1979
-
L. A. R. Rivest, A. Shamir, "On digit signatures and public key cryptosystems", Technical Report MIT/LCS/TR-212, MIT, Laboratory for Computer Science, Location, 1979.
-
-
-
Rivest, L.A.R.1
Shamir, A.2
-
16
-
-
34547672984
-
-
Database Encryption in Oracle9i™, An Oracle Technical White Paper, 2001.
-
Database Encryption in Oracle9i™, An Oracle Technical White Paper, 2001.
-
-
-
|