-
1
-
-
3142716056
-
Order-Preserving Encryption for Numeric Data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-Preserving Encryption for Numeric Data. In: SIGMOD Conference, pp. 563-574 (2004)
-
(2004)
SIGMOD Conference
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
0015050308
-
Alternative Algorithm for Hilbert's Space-Filling Curve
-
Butz, A.R.: Alternative Algorithm for Hilbert's Space-Filling Curve. IEEE Trans. Comput. 20(4) (1971)
-
(1971)
IEEE Trans. Comput
, vol.20
, Issue.4
-
-
Butz, A.R.1
-
3
-
-
77958484856
-
-
Devanbu, P.T., Gertz, M., Martel, C.U., Stubblebine, S.G.: Authentic Third-party Data Publication. In: DBSec, pp. 101-112 (2000)
-
Devanbu, P.T., Gertz, M., Martel, C.U., Stubblebine, S.G.: Authentic Third-party Data Publication. In: DBSec, pp. 101-112 (2000)
-
-
-
-
5
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database-service-provider Model
-
Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-service-provider Model. In: SIGMOD Conference, pp. 216-227 (2002)
-
(2002)
SIGMOD Conference
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
6
-
-
0036204131
-
Providing Database as a Service
-
Hacigümüs, H., Mehrotra, S., Iyer, B.R.: Providing Database as a Service. In: ICDE, p. 29 (2002)
-
(2002)
ICDE
, pp. 29
-
-
Hacigümüs, H.1
Mehrotra, S.2
Iyer, B.R.3
-
7
-
-
33846316938
-
Über die stetige Abbildung einer Linie auf ein Flächenstück. Mathe-matische
-
Hilbert, D.: Über die stetige Abbildung einer Linie auf ein Flächenstück. Mathe-matische Annalen (38), 459-460 (1891)
-
(1891)
Annalen
, vol.38
, pp. 459-460
-
-
Hilbert, D.1
-
8
-
-
0025446215
-
Linear Clustering of Objects with Multiple Atributes
-
Jagadish, H.V.: Linear Clustering of Objects with Multiple Atributes. In: SIGMOD Conference, pp. 332-342 (1990)
-
(1990)
SIGMOD Conference
, pp. 332-342
-
-
Jagadish, H.V.1
-
9
-
-
37849018331
-
-
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, 4605, pp. 239-257. Springer, Heidelberg (2007)
-
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239-257. Springer, Heidelberg (2007)
-
-
-
-
10
-
-
47149116515
-
Location-Based Spatial Query Processing in Wireless Broadcast Environments
-
Ku, W.-S., Zimmermann, R., Wang, H.: Location-Based Spatial Query Processing in Wireless Broadcast Environments. IEEE Trans. Mob. Comput. 7(6), 778-791 (2008)
-
(2008)
IEEE Trans. Mob. Comput
, vol.7
, Issue.6
, pp. 778-791
-
-
Ku, W.-S.1
Zimmermann, R.2
Wang, H.3
-
11
-
-
0010277904
-
Querying multi-dimensional data indexed using the hilbert space-filling curve
-
Lawder, J.K., King, P.J.H.: Querying multi-dimensional data indexed using the hilbert space-filling curve. SIGMOD Record 30(1), 19-24 (2001)
-
(2001)
SIGMOD Record
, vol.30
, Issue.1
, pp. 19-24
-
-
Lawder, J.K.1
King, P.J.H.2
-
12
-
-
84969346266
-
A Certified Digital Signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
13
-
-
0035049112
-
Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
-
Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE Trans. Knowl. Data Eng. 13(1), 124-141 (2001)
-
(2001)
IEEE Trans. Knowl. Data Eng
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.V.2
Faloutsos, C.3
Saltz, J.H.4
-
14
-
-
58149462240
-
Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases
-
Mouratidis, K., Sacharidis, D., Pang, H.: Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. VLDB J. 18(1), 363-381 (2009)
-
(2009)
VLDB J
, vol.18
, Issue.1
, pp. 363-381
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
15
-
-
70350428365
-
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases. In: NDSS (2004)
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases. In: NDSS (2004)
-
-
-
-
16
-
-
84976784176
-
Spatial Query Processing in an Object-Oriented Database System
-
Orenstein, J.A.: Spatial Query Processing in an Object-Oriented Database System. In: SIGMOD Conference, pp. 326-336 (1986)
-
(1986)
SIGMOD Conference
, pp. 326-336
-
-
Orenstein, J.A.1
-
17
-
-
29844457793
-
Verifying Completeness of Relational Query Results in Data Publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying Completeness of Relational Query Results in Data Publishing. In: SIGMOD Conference, pp. 407-418 (2005)
-
(2005)
SIGMOD Conference
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
18
-
-
67649657667
-
-
Papadopoulos, S., Papadias, D., Cheng, W., Tan, K.-L.: Separating Authentication from Query Execution in Outsourced Databases. In: ICDE (2009)
-
Papadopoulos, S., Papadias, D., Cheng, W., Tan, K.-L.: Separating Authentication from Query Execution in Outsourced Databases. In: ICDE (2009)
-
-
-
-
19
-
-
84953635000
-
-
Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blow-fish). In: Anderson, R. (ed.) FSE 1993. LNCS, 809, pp. 191-204. Springer, Heidelberg (1994)
-
Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blow-fish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
-
-
-
-
20
-
-
70350395750
-
-
Schneier, B.: Applied Cryptography (2nd ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1996)
-
Schneier, B.: Applied Cryptography (2nd ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1996)
-
-
-
-
21
-
-
33745601730
-
Query Execution Assurance for Outsourced Databases
-
Sion, R.: Query Execution Assurance for Outsourced Databases. In: VLDB, pp. 601-612 (2005)
-
(2005)
VLDB
, pp. 601-612
-
-
Sion, R.1
-
23
-
-
70349251911
-
Dual Encryption for Query Integrity Assurance
-
Wang, H., Yin, J., Perng, C.-S., Yu, P.S.: Dual Encryption for Query Integrity Assurance. In: CIKM, pp. 863-872 (2008)
-
(2008)
CIKM
, pp. 863-872
-
-
Wang, H.1
Yin, J.2
Perng, C.-S.3
Yu, P.S.4
-
24
-
-
52649150749
-
Spatial Outsourcing for Location-based Services
-
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial Outsourcing for Location-based Services. In: ICDE, pp. 1082-1091 (2008)
-
(2008)
ICDE
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
25
-
-
70350419390
-
-
Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing of Private Spatial Data for Search Services. In: ICDE (2009)
-
Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing of Private Spatial Data for Search Services. In: ICDE (2009)
-
-
-
|