메뉴 건너뛰기




Volumn 4734 LNCS, Issue , 2007, Pages 327-342

Encryption techniques for secure database outsourcing

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSFER; DATABASE SYSTEMS; PROBABILITY; PROBLEM SOLVING; SECURITY OF DATA; USER INTERFACES;

EID: 38049029760     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74835-9_22     Document Type: Conference Paper
Times cited : (23)

References (13)
  • 1
    • 38049001544 scopus 로고    scopus 로고
    • Trust Is not Enough: Privacy and Security in ASP and Web Service Environments
    • Manolopoulos, Y, Návrat, P, eds, ADBIS 2002, Springer, Heidelberg
    • Boyens, C., Günther, O.: Trust Is not Enough: Privacy and Security in ASP and Web Service Environments. In: Manolopoulos, Y., Návrat, P. (eds.) ADBIS 2002. LNCS, vol. 2435, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2435
    • Boyens, C.1    Günther, O.2
  • 3
    • 0005301490 scopus 로고
    • On Data Banks and Privacy Homomorphisms
    • DeMillo, R, Dobkin, D, Jones, A, Lipton, R, eds, Academic Press, London
    • Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms. In: DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Foundations of Secure Computation, Academic Press, London (1978)
    • (1978) Foundations of Secure Computation
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 5
    • 34247363892 scopus 로고    scopus 로고
    • Secure Indexes. Cryptology ePrint Archive
    • Report 2003/216
    • Goh, E.J.: Secure Indexes. Cryptology ePrint Archive: Report 2003/216, http://eprint.iacr.org/2003/216/
    • Goh, E.J.1
  • 6
    • 0033705124 scopus 로고    scopus 로고
    • Practical Techniques for Searches on Encrypted Data
    • IEEE Computer Society Press, Los Alamitos
    • Song, D.X., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) IEEE Symposium on Security and Privacy
    • Song, D.X.1    Wagner, D.2    Perrig, A.3
  • 7
    • 35048901123 scopus 로고    scopus 로고
    • Public-key Encryption with Keyword Search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027
    • Boneh, D.1    Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 10
    • 1842514147 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on The RSA Encryption Standard PKCS#1
    • Advances in Cryptology
    • Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on The RSA Encryption Standard PKCS#1. In: Advances in Cryptology (1998)
    • (1998)
    • Bleichenbacher, D.1
  • 12
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-Preserving Queries on Encrypted Data
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.