-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. SIGMOD (2004)
-
(2004)
SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
0025447750
-
The R*-tree: An efficient and robust access method for points and rectangles
-
Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD (1990)
-
(1990)
SIGMOD
-
-
Beckmann, N.1
Kriegel, H.-P.2
Schneider, R.3
Seeger, B.4
-
5
-
-
62749198172
-
Query assurance verification for outsourced multi-dimensional databases
-
to appear
-
Cheng, W., Tan, K.-L.: Query assurance verification for outsourced multi-dimensional databases. J. Comput. Secur. (to appear)
-
J. Comput. Secur.
-
-
Cheng, W.1
Tan, K.-L.2
-
6
-
-
67649485810
-
Authenticating kNN query results in data publishing
-
Cheng, W., Tan, K.-L.: Authenticating kNN query results in data publishing. Secure Data Management (2007)
-
(2007)
Secure Data Management
-
-
Cheng, W.1
Tan, K.-L.2
-
7
-
-
52649097332
-
Authenticating multi-dimensional query results in data publishing
-
Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. DBSEC (2006)
-
(2006)
DBSEC
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
8
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. VLDB (2007)
-
(2007)
VLDB
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
38049038695
-
-
Crypto++ library.: www.eskimo.com/~weidai/benchmark.html
-
Crypto++ Library
-
-
-
12
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., Vimercati, C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. CCS (2003)
-
(2003)
CCS
-
-
Damiani, E.1
Vimercati, C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
0021615874
-
R-trees: A dynamic index structure for spatial searching
-
Guttman, A.: R-trees: A dynamic index structure for spatial searching. SIGMOD (1984)
-
(1984)
SIGMOD
-
-
Guttman, A.1
-
14
-
-
4143107964
-
Authenticated data structures for graph and geometric searching
-
Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. CT-RSA (2003)
-
(2003)
CT-RSA
-
-
Goodrich, M.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
15
-
-
84989338883
-
Answering aggregate queries in a secure system model
-
Ge, T., Zdonik, S.: Answering aggregate queries in a secure system model. VLDB (2007)
-
(2007)
VLDB
-
-
Ge, T.1
Zdonik, S.2
-
16
-
-
67649492541
-
Privacy-preserving verification of aggregate queries on outsourced databases
-
Haber, S., Horne, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. HP Labs Tech-Report 2006-128 (2006)
-
(2006)
HP Labs Tech-Report
, vol.2006
, Issue.128
-
-
Haber, S.1
Horne, W.2
Sander, T.3
Yao, D.4
-
18
-
-
0036361105
-
Executing SQL over encrypted data in the data-service-provider model
-
HacIgümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the data-service-provider model. SIGMOD (2002)
-
(2002)
SIGMOD
-
-
HacIgümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
19
-
-
0000701994
-
Distance browsing in spatial databases
-
G. Hjaltason H. Samet 1999 Distance browsing in spatial databases ACM TODS. 24 2 265 318
-
(1999)
ACM TODS.
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltason, G.1
Samet, H.2
-
20
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. SIGMOD (2006)
-
(2006)
SIGMOD
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
21
-
-
85011031975
-
Proof-infused streams: Enabling authentication of sliding window queries on streams
-
Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: enabling authentication of sliding window queries on streams. VLDB (2007)
-
(2007)
VLDB
-
-
Li, F.1
Yi, K.2
Hadjieleftheriou, M.3
Kollios, G.4
-
22
-
-
0001263548
-
A certified digital signature
-
Merkle, R.: A certified digital signature. CRYPTO (1989)
-
(1989)
CRYPTO
-
-
Merkle, R.1
-
24
-
-
33746668803
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: immutability for aggregated/condensed signatures. ESORICS (2004)
-
(2004)
ESORICS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
26
-
-
85084162561
-
Certificate revocation and certificate update
-
Naor, M., Nissim, K.: Certificate revocation and certificate update. USENIX (1998)
-
(1998)
USENIX
-
-
Naor, M.1
Nissim, K.2
-
27
-
-
34548160016
-
Authentication of outsourced databases using signature aggregation and chaining
-
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. DASFAA (2006)
-
(2006)
DASFAA
-
-
Narasimha, M.1
Tsudik, G.2
-
28
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. SIGMOD (2005)
-
(2005)
SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
29
-
-
0027875582
-
Towards an analysis of range query performance in spatial data structures
-
Pagel, B., Six, H., Toben, H., Widmayer, P.: Towards an analysis of range query performance in spatial data structures. PODS (1993)
-
(1993)
PODS
-
-
Pagel, B.1
Six, H.2
Toben, H.3
Widmayer, P.4
-
31
-
-
2442590644
-
Authenticating query results in edge computing
-
Pang, H., Tan, K.-L.: Authenticating query results in edge computing. ICDE (2004)
-
(2004)
ICDE
-
-
Pang, H.1
Tan, K.-L.2
-
32
-
-
85011016388
-
CADS: Continuous authentication on data streams
-
Papadopoulos, S., Yang, Y., Papadias, D.: CADS: continuous authentication on data streams. VLDB (2007)
-
(2007)
VLDB
-
-
Papadopoulos, S.1
Yang, Y.2
Papadias, D.3
-
34
-
-
33745601730
-
Query execution assurance for outsourced databases
-
Sion R.: Query execution assurance for outsourced databases. VLDB (2005)
-
(2005)
VLDB
-
-
Sion, R.1
-
35
-
-
67649475028
-
A model for the prediction of R-tree performance
-
Theodoridis, Y., Sellis, T.: A model for the prediction of R-tree performance. PODS (1999)
-
(1999)
PODS
-
-
Theodoridis, Y.1
Sellis, T.2
-
36
-
-
84861935456
-
Efficient content authentication in Peer-to-Peer networks
-
Tamassia, R., Triandopoulos, N.: Efficient content authentication in Peer-to-Peer networks. ACNS (2007)
-
(2007)
ACNS
-
-
Tamassia, R.1
Triandopoulos, N.2
-
37
-
-
85011072055
-
Security in outsourcing of association rule mining
-
Wong, W., Cheung, D., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. VLDB (2007)
-
(2007)
VLDB
-
-
Wong, W.1
Cheung, D.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
-
38
-
-
84997556980
-
Integrity audit of outsourced data
-
Xie, M., Wang, H., Yin, J., Meng, X. Integrity audit of outsourced data. VLDB (2007)
-
(2007)
VLDB
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
|