-
1
-
-
77950255761
-
The forrester wave: Database encryption solutions, Q3 2005
-
Aug.
-
N. Yuhanna, "The forrester wave: Database encryption solutions, Q3 2005," Forrester, Aug. 2005.
-
(2005)
Forrester
-
-
Yuhanna, N.1
-
2
-
-
33744475234
-
Anti-tamper database research: Inference control techniques
-
Case Western Reserve University, Nov.
-
G. Bebek, "Anti-tamper database research: Inference control techniques," Technical Report EECS 433 Final Report, Case Western Reserve University, Nov. 2002.
-
(2002)
Technical Report EECS 433 Final Report
-
-
Bebek, G.1
-
4
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM, Paris, France
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," Proc. ACM SIGMOD 2004, ACM, Paris, France, 2004.
-
(2004)
Proc. ACM SIGMOD 2004
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
34548786107
-
Fast, secure encryption for indexing in a column-oriented DBMS
-
T. Ge and S. Zdongik, "Fast, secure encryption for indexing in a column-oriented DBMS," ICDE 2007, 2007.
-
(2007)
ICDE 2007
-
-
Ge, T.1
Zdongik, S.2
-
6
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin
-
H. Hacigümüs, B.R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," Proc. ACM SIGMOD Conference on Management of Data, Madison, Wisconsin, 2002.
-
(2002)
Proc. ACM SIGMOD Conference on Management of Data
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
7
-
-
85065578926
-
A privacy-preserving index for range queries
-
Morgan Kaufmann, Toronto, Canada
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," VLDB 2004, Morgan Kaufmann, Toronto, Canada, 2004.
-
(2004)
VLDB 2004
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
8
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
E. Damiani, S.D.C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing confidentiality and efficiency in untrusted relational dbmss," Proc. 10th ACM Conference on Computer and Communications Security (CCS), 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS)
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
Feb.
-
A. Ceselli, E. Damiani, S. De Capitani Di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Modeling and assessing inference exposure in encrypted databases," ACM Trans. Information and System Security, vol.8, no.1, pp.119-152, Feb. 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Oakland, California
-
D.X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," IEEE Symp. on Security and Privacy, Oakland, California, 2000.
-
(2000)
IEEE Symp. on Security and Privacy
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
11
-
-
35048901123
-
Public key encryption with keyword search
-
EUROCRYPT, Springer
-
D. Boneh, G. Di Grescenzo, R. Ostrovsky, and G. Perisano, "Public key encryption with keyword search," EUROCRYPT, vol.3027 of Lecture Notes in Computer Science, pp.506-522, Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Grescenzo, G.2
Ostrovsky, R.3
Perisano, G.4
-
12
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Proc. 2004 Applied Cryptography and Network Security Conference
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," Proc. 2004 Applied Cryptography and Network Security Conference, pp.31-45, Lecture Notes in Computers Science 3089, 2004.
-
(2004)
Lecture Notes in Computers Science
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
13
-
-
34247363892
-
Secure indexes, Cryptography ePrint archive
-
E.-J. Goh, "Secure indexes, Cryptography ePrint archive," Report 2003/216, 2003, http://eprint.iacr.org/2006/216/
-
(2003)
Report 2003/216
-
-
Goh, E.-J.1
-
14
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
ACNS
-
Y.C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," ACNS, vol.3531 of Lecture Notes in Computer Science, pp.442-455, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
18
-
-
0040341424
-
Representations for real numbers and their ergodic properties
-
A. Rényi, Representations for Real Numbers and Their Ergodic Properties, Acta Math. Acad. Sci. Hugnar., 1957.
-
(1957)
Acta Math. Acad. Sci. Hugnar.
-
-
Rényi, A.1
|