-
1
-
-
0015385037
-
Nonlinear Bayesian Estimation Using Gaussian Sum Approximations
-
Aug
-
Alspach, D. and Sorenson, H. Nonlinear Bayesian Estimation Using Gaussian Sum Approximations. IEEE Transactions on Automatic Control, Vol. 17, No. 4, p. 439-448, Aug., 1972.
-
(1972)
IEEE Transactions on Automatic Control
, vol.17
, Issue.4
, pp. 439-448
-
-
Alspach, D.1
Sorenson, H.2
-
5
-
-
17444370055
-
Public-key encryption with keyword search
-
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Public-key encryption with keyword search. In Proceedings of Eurocrypt 2004.
-
(2004)
Proceedings of Eurocrypt
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
77957863696
-
A Security Model for Full-Text File System Search in Multi-User Environments
-
Buttcher, S. and Clarke, C. LA. A Security Model for Full-Text File System Search in Multi-User Environments. In Proceedings of the FAST, 2005.
-
(2005)
Proceedings of the FAST
-
-
Buttcher, S.1
Clarke, C.L.2
-
7
-
-
34748812366
-
Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive
-
Report 2004/051, Feb
-
Chang, Y.-C. and Mitzenmacher, M. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, Feb 2004.
-
(2004)
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
8
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung, B. C. M., Wang, K. and Yu, P. S. Top-down specialization for information and privacy preservation. In Proceedings of ICDE 2005.
-
(2005)
Proceedings of ICDE
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
9
-
-
70349136391
-
-
Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
-
Goh, E., Shacham, H., Modadugu, N. and Boneh, D. Sirius: Securing remote untrusted storage. In NDSS, 2003.
-
-
-
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B. R., Li, C. and Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the SIGMOD, 2002.
-
(2002)
Proceedings of the SIGMOD
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
11
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar, V. Transforming data to satisfy privacy constraints. In Proceedings of the SIGKDD, 2002.
-
(2002)
Proceedings of the SIGKDD
-
-
Iyengar, V.1
-
12
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q. and Fu, K. Plutus: scalable secure file sharing on untrusted storage. In Proceedings of the FAST, 2003.
-
(2003)
Proceedings of the FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
13
-
-
43349083205
-
Using Link Analysis to Identify Aspects in Faceted Web Search
-
Seattle, WA
-
Kohlschutter, C., Chirita, P.-A. and Nejdl W. Using Link Analysis to Identify Aspects in Faceted Web Search. SIGIR2006 Faceted Search Workshop, 2006, Seattle, WA.
-
(2006)
SIGIR2006 Faceted Search Workshop
-
-
Kohlschutter, C.1
Chirita, P.-A.2
Nejdl, W.3
-
14
-
-
85009120801
-
Controlling Access to Published Data Using Cryptography
-
Miklau, G. and Suciu, D. Controlling Access to Published Data Using Cryptography. In Proc. of the VLDB 2003.
-
(2003)
Proc. of the VLDB
-
-
Miklau, G.1
Suciu, D.2
-
15
-
-
85054431103
-
Trustworthy keyword search for regulatory-compliant records retention
-
Seoul, Korea
-
Mitra, S., Hsu, W. W. and Winslett, M. Trustworthy keyword search for regulatory-compliant records retention, In Proceedings of VLDB, 2006, Seoul, Korea, 1001-1012.
-
(2006)
Proceedings of VLDB
, pp. 1001-1012
-
-
Mitra, S.1
Hsu, W.W.2
Winslett, M.3
-
16
-
-
70349151903
-
-
Open Directory Project: http://www.dmoz.org/
-
-
-
-
18
-
-
0344756842
-
Modern Information Retrieval: A Brief Overview
-
Singhal, A. Modern Information Retrieval: A Brief Overview. In IEEE, Data Eng. Bull. 24(4), 2001
-
(2001)
IEEE, Data Eng. Bull
, vol.24
, Issue.4
-
-
Singhal, A.1
-
19
-
-
0033705124
-
-
Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. In Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
-
Song, D. X., Wagner, D., Perrig, A. Practical Techniques for Searches on Encrypted Data. In Proceedings of IEEE Security and Privacy Symposium, May 2000, 44-55.
-
-
-
-
20
-
-
70349138970
-
-
Available at
-
Stud IP LMS. Available at: http://www.studip.de/.
-
-
-
-
21
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
Workshop
-
Swaminathan, A., Mao, Y., Su, G.-M., Gou, H., Varna, A. L., He, S., Wu, M., Oard, D. W. Confidentiality-preserving rank-ordered search. In Proc. of StorageSS '07 Workshop.
-
Proc. of StorageSS '07
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
22
-
-
43349086436
-
Zerber: R-Confidential Indexing for Distributed Documents
-
Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett M., Mitra, S. Zerber: r-Confidential Indexing for Distributed Documents. In Proceedings of the EDBT 2008.
-
(2008)
Proceedings of the EDBT
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
|