-
1
-
-
38049001544
-
Trust Is not Enough: Privacy and Security in ASP and Web Service Environments
-
Manolopoulos, Y, Návrat, P, eds, ADBIS 2002, Springer, Heidelberg
-
Boyens, C., Günther, O.: Trust Is not Enough: Privacy and Security in ASP and Web Service Environments. In: Manolopoulos, Y., Návrat, P. (eds.) ADBIS 2002. LNCS, vol. 2435, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2435
-
-
Boyens, C.1
Günther, O.2
-
3
-
-
0005301490
-
On Data Banks and Privacy Homomorphisms
-
DeMillo, R, Dobkin, D, Jones, A, Lipton, R, eds, Academic Press, London
-
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms. In: DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Foundations of Secure Computation, Academic Press, London (1978)
-
(1978)
Foundations of Secure Computation
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
4
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database-Service-Provider Model
-
ACM Press, New York
-
Hacigüm̈ş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: Proceedings of the 28th SIGMOD Conference on the Management of Data, ACM Press, New York (2002)
-
(2002)
Proceedings of the 28th SIGMOD Conference on the Management of Data
-
-
Hacigüm̈ş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
5
-
-
34247363892
-
Secure Indexes. Cryptology ePrint Archive
-
Report 2003/216
-
Goh, E.J.: Secure Indexes. Cryptology ePrint Archive: Report 2003/216, http://eprint.iacr.org/2003/216/
-
-
-
Goh, E.J.1
-
6
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
IEEE Computer Society Press, Los Alamitos
-
Song, D.X., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
7
-
-
35048901123
-
Public-key Encryption with Keyword Search
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
10
-
-
1842514147
-
Chosen Ciphertext Attacks Against Protocols Based on The RSA Encryption Standard PKCS#1
-
Advances in Cryptology
-
Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on The RSA Encryption Standard PKCS#1. In: Advances in Cryptology (1998)
-
(1998)
-
-
Bleichenbacher, D.1
-
11
-
-
33749594681
-
Provable security for outsourcing database operations
-
IEEE Computer Society, Los Alamitos
-
Evdokimov, S., Fischmann, M., Günther, O.: Provable security for outsourcing database operations. In: ICDE '06: Proceedings of the 22nd International Conference on Data Engineering, IEEE Computer Society, Los Alamitos (2006)
-
(2006)
ICDE '06: Proceedings of the 22nd International Conference on Data Engineering
-
-
Evdokimov, S.1
Fischmann, M.2
Günther, O.3
-
12
-
-
33750247597
-
Privacy-Preserving Queries on Encrypted Data
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
|