-
1
-
-
49149119622
-
Computing in the clouds
-
Dec.
-
A. Weiss. Computing in the Clouds. netWorker, 11(4):16-25, Dec. 2007.
-
(2007)
NetWorker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
4
-
-
77953072434
-
-
18 Jul
-
Google App Engine, http://appengine.google.com [18 Jul 2008].
-
(2008)
Google App Engine
-
-
-
5
-
-
70749122619
-
-
18 Jul
-
Microsoft Live Mesh, http://www.mesh.com [18 Jul 2008].
-
(2008)
Microsoft Live Mesh
-
-
-
6
-
-
70749142805
-
Executing SQL over encrypted data in database-service-Provider model
-
Database Research Group at University of California, Irvine
-
H. Haclgiimfi, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in Database-Service-Provider Model. Technical Report TR-DB-02-02, Database Research Group at University of California, Irvine, 2002.
-
(2002)
Technical Report TR-DB-02-02
-
-
Haclgiimfi, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. Proceedings of Eurocrypt 2004, Lecture Notes in Computer Science 3027, pp. 506-522.
-
Proceedings of Eurocrypt 2004, Lecture Notes in Computer Science 3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
0037623983
-
Identity based encryption from the weil pairing
-
also as an extended abstract in Crypto 2001
-
D. Boneh and M. Franklin. Identity Based Encryption from the Weil Pairing. SIAM J. of Computing, 32 (3): 586-615, 2003, also as an extended abstract in Crypto 2001.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
84947444524
-
-
A. K. Bennett, C. Grotho-, T. Horozov, and I. Patrascu. Efficient Sharing of Encrypted Data. Proceedings of ACISP 2002, Lecture Notes in Computer Science 2384, pp. 107-120.
-
Efficient Sharing of Encrypted Data. Proceedings of ACISP 2002, Lecture Notes in Computer Science 2384
, pp. 107-120
-
-
Bennett, A.K.1
Grotho, C.2
Horozov, T.3
Patrascu, I.4
-
13
-
-
84946837370
-
Key-Privacy in public-key encryption
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-Privacy in Public-Key Encryption. Proceedings of Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248, pp. 566-582.
-
Proceedings of Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
14
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environment
-
Jul.
-
K. Ren, W. Lou, K. Kim, and R. Deng. A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environment. IEEE Transactions on Vehicular Technology, 55(4):1373- 1384, Jul. 2006.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
15
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. Proceedings of TCC 2007, Lecture Notes in Computer Science 4392, pp. 535-554.
-
Proceedings of TCC 2007, Lecture Notes in Computer Science 4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
16
-
-
34548774576
-
Multi- dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T-H. H. Chan, D. Song, and A. Perrig. Multi- Dimensional Range Query over Encrypted Data. Proceedings of IEEE Symposium on Security and Privacy 2007, pp. 350-364.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
|