-
1
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," in Proc. of the ACM SIGMOD Conf., 2002.
-
(2002)
Proc. of the ACM SIGMOD Conf
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
2
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. of the VLDB Conf., 2004, pp. 720-731.
-
(2004)
Proc. of the VLDB Conf
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
3
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proc. of the ACM SIGMOD Conf., 2004, pp. 563-574.
-
(2004)
Proc. of the ACM SIGMOD Conf
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, "Two can keep a secret: A distributed architecture for secure database services." in CIDR, 2005, pp. 186-199.
-
(2005)
CIDR
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
8
-
-
67649643946
-
Designing secure indexes for encrypted databases
-
E. Shmueli, R. Waisenberg, Y. Elovici, and E. Gudes, "Designing secure indexes for encrypted databases," in Proc. of the IFIP Conference on Database and Applications Security, 2005.
-
(2005)
Proc. of the IFIP Conference on Database and Applications Security
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
10
-
-
0001959541
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky, "Replication is not needed: Single database, computationally-private information retrieval," in Proc. of the FOCS, 1997.
-
(1997)
Proc. of the FOCS
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
11
-
-
0032201622
-
Private infomation retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private infomation retrieval," Journal of the ACM, vol. 45, no. 6, pp. 965-982, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
12
-
-
22444454758
-
A new and efiicient all-or-nothing disclosure of secrets protocol
-
J. Stern, "A new and efiicient all-or-nothing disclosure of secrets protocol," in Proc. of Asia Crypt, 1998.
-
(1998)
Proc. of Asia Crypt
-
-
Stern, J.1
-
13
-
-
23044519068
-
One-way trapdoor permuttions are sufficient for non-trivial single-server private information retrieval
-
E. Kushilevitz and R. Ostrovsky, "One-way trapdoor permuttions are sufficient for non-trivial single-server private information retrieval," in Proc. of the EUROCRYPT, 2000.
-
(2000)
Proc. of the EUROCRYPT
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
14
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. of the EUROCRYPT, 1999.
-
(1999)
Proc. of the EUROCRYPT
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
17
-
-
33749382489
-
Authentic thirdparty data publication
-
P. Devambu, M. Gertz, C. Martel, and S. Stubblebine, "Authentic thirdparty data publication," in Proc. of the IFIP Workshop on Database Security, 2000.
-
(2000)
Proc. of the IFIP Workshop on Database Security
-
-
Devambu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
19
-
-
33745601730
-
Query execution assurance for outsourced database
-
R. Sion, "Query execution assurance for outsourced database," in Proc. of VLDB Conf., 2005.
-
(2005)
Proc. of VLDB Conf
-
-
Sion, R.1
-
20
-
-
29844457793
-
Verifying completeness of relational query resultts in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K. Tan, "Verifying completeness of relational query resultts in data publishing," in Proc. of the ACM SIGMOD Conf, 2005.
-
(2005)
Proc. of the ACM SIGMOD Conf
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
21
-
-
34548160016
-
Authentication of outsourced database using signature aggregation and chaining
-
M. Narasimha and G. Tsudik, "Authentication of outsourced database using signature aggregation and chaining," in Proc. of DASFAA, 2006.
-
(2006)
Proc. of DASFAA
-
-
Narasimha, M.1
Tsudik, G.2
-
22
-
-
79952940395
-
Secure data outsourcing
-
R. Sion, "Secure data outsourcing," in Proc. of the VLDB Conf., 2007, pp. 1431-1432.
-
(2007)
Proc. of the VLDB Conf
, pp. 1431-1432
-
-
Sion, R.1
-
23
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
T. Ge and S. B. Zdonik, "Answering aggregation queries in a secure system model," in Proc. of the VLDB Conf., 2007, pp. 519-530.
-
(2007)
Proc. of the VLDB Conf
, pp. 519-530
-
-
Ge, T.1
Zdonik, S.B.2
-
24
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in Proc. of the VLDB Conf., 2007, pp. 123-134.
-
(2007)
Proc. of the VLDB Conf
, pp. 123-134
-
-
di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
25
-
-
35448952234
-
Ghostdb: Querying visible and hidden data without leaks
-
N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, "Ghostdb: querying visible and hidden data without leaks," in Proc. of the ACM SIGMOD Conf., 2007, pp. 677-688.
-
(2007)
Proc. of the ACM SIGMOD Conf
, pp. 677-688
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Pucheral, P.4
Shasha, D.5
-
26
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. of the ACM SIGMOD Conf., 2003, pp. 86-97.
-
(2003)
Proc. of the ACM SIGMOD Conf
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
28
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in private information retrieval schemes," in Proc. of the STOC, 1998, pp. 151-160.
-
(1998)
Proc. of the STOC
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
29
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. of the STOC, 1999, pp. 245-254.
-
(1999)
Proc. of the STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
30
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekçi, D. Agrawal, A. El Abbadi, and A. Gulbeden, "Privacy preserving query processing using third parties." in ICDE, 2006, p. 27.
-
(2006)
ICDE
, pp. 27
-
-
Emekçi, F.1
Agrawal, D.2
El Abbadi, A.3
Gulbeden, A.4
|