-
1
-
-
28444484619
-
Progressive Distributed Top-k Retrieval in Peer-to-Peer Networks
-
Balke, W., Nejdi, W., Siberski, W. and Thaden, U. Progressive Distributed Top-k Retrieval in Peer-to-Peer Networks. In Proceedings of the ICDE, 2005.
-
(2005)
Proceedings of the ICDE
-
-
Balke, W.1
Nejdi, W.2
Siberski, W.3
Thaden, U.4
-
2
-
-
33745631271
-
MINERVA: Collaborative P2P Search (Demo)
-
Bender, M., Michel, S., Triantafillou, P., Weikum, G. and Zimmer, C. MINERVA: Collaborative P2P Search (Demo); In: Proceedings of the VLDB 2005.
-
(2005)
Proceedings of the VLDB
-
-
Bender, M.1
Michel, S.2
Triantafillou, P.3
Weikum, G.4
Zimmer, C.5
-
7
-
-
19944380112
-
-
Bertino, E. and Sandhu, R. Database Security-Concepts, Approaches, and Challenges 2005, 2, Issue 1, 2-19.
-
Bertino, E. and Sandhu, R. Database Security-Concepts, Approaches, and Challenges 2005, Volume 2, Issue 1, 2-19.
-
-
-
-
8
-
-
21844467455
-
A cryptographic file system for UNIX
-
Blaze, M. A cryptographic file system for UNIX. In Proceedings of the CCS, 1993.
-
(1993)
Proceedings of the CCS
-
-
Blaze, M.1
-
9
-
-
38949164733
-
Chronos: An authenticated dictionary based on skip lists for timestamping systems
-
Blibech, K. and Gabillon, A. Chronos: an authenticated dictionary based on skip lists for timestamping systems. In Workshop on Secure Web Services, 2005.
-
(2005)
Workshop on Secure Web Services
-
-
Blibech, K.1
Gabillon, A.2
-
10
-
-
17444370055
-
Public-key encryption with keyword search
-
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Public-key encryption with keyword search, In Proceedings of Eurocrypt 2004.
-
(2004)
Proceedings of Eurocrypt
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
11
-
-
77957863696
-
A Security Model for Full-Text File System Search in Multi-User Environments
-
San Francisco, California
-
Büttcher, S. and Clarke, C. L. A. A Security Model for Full-Text File System Search in Multi-User Environments; In Proceedings of the FAST, 2005, San Francisco, California.
-
(2005)
Proceedings of the FAST
-
-
Büttcher, S.1
Clarke, C.L.A.2
-
12
-
-
34748812366
-
Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive
-
Report 2004/051, Feb
-
Chang, Y.-C. and Mitzenmacher, M. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, Feb 2004. http://eprint.iacr.org/2004/051/
-
(2004)
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
13
-
-
27844586850
-
A group key recovery mechanism based on logical key hierarchy
-
Sep
-
Cho, T., Lee, S. and Kim, W. 2004. A group key recovery mechanism based on logical key hierarchy. J. Comput. Secur. 12, 5 (Sep. 2004), 711-736.
-
(2004)
J. Comput. Secur
, vol.12
, Issue.5
, pp. 711-736
-
-
Cho, T.1
Lee, S.2
Kim, W.3
-
14
-
-
43349100278
-
-
Crescenzi, P. and Kann, V. A compendium of NP optimization problems. Available at: http://www.nada.kth.se/~viggo/problemlist/.
-
Crescenzi, P. and Kann, V. A compendium of NP optimization problems. Available at: http://www.nada.kth.se/~viggo/problemlist/.
-
-
-
-
15
-
-
0033075316
-
Combining fuzzy information from multiple systems
-
Fagin, R. Combining fuzzy information from multiple systems. Journal of Computer and System Sciences 1999, Volume 58, Number 1, 216-226.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 216-226
-
-
Fagin, R.1
-
16
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan
-
Fung, B. C. M., Wang, K. and Yu, P. S. Top-down specialization for information and privacy preservation. In Proceedings of ICDE, 2005, Tokyo, Japan, 205-216.
-
(2005)
Proceedings of ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
17
-
-
43349101929
-
-
Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
-
Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
-
-
-
-
18
-
-
84964426510
-
-
Goodrich, M., Tamassia, R., and Schwerin, A. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DISCEX II, 2001.
-
Goodrich, M., Tamassia, R., and Schwerin, A. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DISCEX II, 2001.
-
-
-
-
19
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B. R., Li, C. and Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of SIGMOD, 2002.
-
(2002)
Proceedings of SIGMOD
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
21
-
-
0000299804
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of the CRYPTO, 1995.
-
(1995)
Proceedings of the CRYPTO
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
22
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar, V. Transforming data to satisfy privacy constraints. In Proceedings of SIGKDD, 2002.
-
(2002)
Proceedings of SIGKDD
-
-
Iyengar, V.1
-
23
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q. and Fu, K. Plutus: scalable secure file sharing on untrusted storage. In Proceedings of the FAST, 2003.
-
(2003)
Proceedings of the FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
24
-
-
43349083205
-
Using Link Analysis to Identify Aspects in Faceted Web Search
-
Seattle, WA
-
Kohlschütter, C., Chirita, P.-A. and Nejdl W. Using Link Analysis to Identify Aspects in Faceted Web Search, SIGIR'2006 Faceted Search Workshop, 2006, Seattle, WA.
-
(2006)
SIGIR'2006 Faceted Search Workshop
-
-
Kohlschütter, C.1
Chirita, P.-A.2
Nejdl, W.3
-
27
-
-
85009120801
-
Controlling Access to Published Data Using Cryptography
-
Miklau, G. and Suciu, D. Controlling Access to Published Data Using Cryptography. In Proceedings of VLDB 2003.
-
(2003)
Proceedings of VLDB
-
-
Miklau, G.1
Suciu, D.2
-
28
-
-
85054431103
-
Trustworthy keyword search for regulatory-compliant records retention
-
Seoul, Korea
-
Mitra, S., Hsu, W. W. and Winslett, M. Trustworthy keyword search for regulatory-compliant records retention, In Proceedings of VLDB, 2006, Seoul, Korea, 1001-1012.
-
(2006)
Proceedings of VLDB
, pp. 1001-1012
-
-
Mitra, S.1
Hsu, W.W.2
Winslett, M.3
-
29
-
-
0018545449
-
How to share a secret
-
Shamir, A. How to share a secret. Communications of the ACM, 1979 Volume 22 Issue 11, 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
0344756842
-
Modem Information Retrieval: A Brief Overview
-
Singhal, A. Modem Information Retrieval: A Brief Overview. In IEEE, Data Eng. Bull. 24(4), 2001
-
(2001)
IEEE, Data Eng. Bull
, vol.24
, Issue.4
-
-
Singhal, A.1
-
31
-
-
0033705124
-
-
Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
-
Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
-
-
-
-
32
-
-
43349106524
-
-
Available at
-
Stud IP LMS. Available at: http://www.studip.de/.
-
-
-
|