-
1
-
-
0042564491
-
Data-centric storage in sensornets with ght, a geographic hash table
-
S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, "Data-centric storage in sensornets with ght, a geographic hash table," Mobile Networks and Applications, vol. 8, no. 4, pp. 427-442, 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.4
, pp. 427-442
-
-
Ratnasamy, S.1
Karp, B.2
Shenker, S.3
Estrin, D.4
Govindan, R.5
Yin, L.6
Yu, F.7
-
2
-
-
85092638639
-
Presto: A predictive storage architecture for sensor networks
-
P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, "Presto: A predictive storage architecture for sensor networks," in Proc. 10th HotOS, 2005.
-
Proc. 10th HotOS, 2005
-
-
Desnoyers, P.1
Ganesan, D.2
Li, H.3
Shenoy, P.4
-
3
-
-
83455207833
-
Microhash: An efficient index structure for flash-based sensor devices
-
D. Zeinalipour-yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, "Microhash: An efficient index structure for flash-based sensor devices," in Proc. 4th USENIX FAST, 2005, pp. 31-44.
-
Proc. 4th USENIX FAST, 2005
, pp. 31-44
-
-
Zeinalipour-yazti, D.1
Lin, S.2
Kalogeraki, V.3
Gunopulos, D.4
Najjar, W.A.5
-
4
-
-
33748074817
-
Data storage placement in sensor networks
-
B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in Proc. 7th ACM MobiHoc, 2006, pp. 344-355.
-
(2006)
Proc. 7th ACM MobiHoc
, pp. 344-355
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
5
-
-
46849090119
-
An approximation algorithm for data storage placement in sensor networks
-
B. Sheng, C. C. Tan, Q. Li, and W. Mao, "An approximation algorithm for data storage placement in sensor networks," in Proc. WASA, 2007, pp. 71-78.
-
Proc. WASA, 2007
, pp. 71-78
-
-
Sheng, B.1
Tan, C.C.2
Li, Q.3
Mao, W.4
-
6
-
-
51349098378
-
Verifiable privacy-preserving range query in two-tiered sensor networks
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in two-tiered sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 46-50.
-
Proc. IEEE INFOCOM, 2008
, pp. 46-50
-
-
Sheng, B.1
Li, Q.2
-
8
-
-
84874396168
-
-
"Rise project," http://www.cs.ucr.edu/rise.
-
Rise Project
-
-
-
9
-
-
84870655865
-
-
"Intel lab data," http://berkeley.intel-research.net/labdata.
-
Intel Lab Data
-
-
-
12
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, "Executing sql over encrypted data in the database-service-provider model," in Proc. ACM SIGMOD, 2002, pp. 216-227.
-
Proc. ACM SIGMOD, 2002
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
13
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. 30th VLDB, 2004, pp. 720-731.
-
Proc. 30th VLDB, 2004
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
14
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proc. ACM SIGMOD, 2004, pp. 563-574.
-
Proc. ACM SIGMOD, 2004
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
16
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. 2nd ACNS, 2004, pp. 31-45.
-
Proc. 2nd ACNS, 2004
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
17
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. Theory of Cryptography Conference (TCC), 2007, pp. 535-554.
-
Proc. Theory of Cryptography Conference (TCC), 2007
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
18
-
-
0038274733
-
Authentic data publication over the internet
-
P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, "Authentic data publication over the internet," Journal of Computer Security, vol. 11, no. 3, pp. 291-314, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
20
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan, "Verifying completeness of relational query results in data publishing," in Proc. ACM SIGMOD, 2005, pp. 407-418.
-
Proc. ACM SIGMOD, 2005
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
21
-
-
34548160016
-
Authentication of outsourced databases using signature aggregation and chaining
-
M. Narasimha and G. Tsudik, "Authentication of outsourced databases using signature aggregation and chaining," in Proc. DASFAA, 2006.
-
Proc. DASFAA, 2006
-
-
Narasimha, M.1
Tsudik, G.2
-
22
-
-
33746749406
-
Authenticating multi-dimensional query results in data publishing
-
W. Cheng, H. Pang, and K.-L. Tan, "Authenticating multi-dimensional query results in data publishing," in Data and Applications Security 2006, 2006, pp. 60-73.
-
(2006)
Data and Applications Security 2006
, pp. 60-73
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
23
-
-
57049158746
-
Access control friendly query verification for outsourced data publishing
-
H. Chen, X. Man, W. Hsu, N. Li, and Q. Wang, "Access control friendly query verification for outsourced data publishing," in Proc. ESORICS, 2008, pp. 177-191.
-
Proc. ESORICS, 2008
, pp. 177-191
-
-
Chen, H.1
Man, X.2
Hsu, W.3
Li, N.4
Wang, Q.5
-
24
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. Merkle, "Protocols for public key cryptosystems," in Proc. IEEE S&P, 1980, pp. 122-134.
-
Proc. IEEE S&P, 1980
, pp. 122-134
-
-
Merkle, R.1
-
25
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing remote untrusted storage," in Proc. NDSS, 2003, pp. 131-145.
-
Proc. NDSS, 2003
, pp. 131-145
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
26
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. FAST, 2003, pp. 29-42.
-
Proc. FAST, 2003
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
27
-
-
48349089344
-
Design and implementation of cross-domain cooperative firewall
-
J. Cheng, H. Yang, S. H. Wong, and S. Lu, "Design and implementation of cross-domain cooperative firewall," in Proc. IEEE ICNP, 2007.
-
Proc. IEEE ICNP, 2007
-
-
Cheng, J.1
Yang, H.2
Wong, S.H.3
Lu, S.4
-
28
-
-
57549111039
-
Collaborative enforcement of firewall policies in virtual private networks
-
A. X. Liu and F. Chen, "Collaborative enforcement of firewall policies in virtual private networks," in Proc. Annual ACM SIGACT-SIGOPS PODC, Toronto, Canada, August 2008.
-
Proc. Annual ACM SIGACT-SIGOPS PODC, Toronto, Canada, August 2008
-
-
Liu, A.X.1
Chen, F.2
-
29
-
-
0035278163
-
Algorithms for packet classification
-
P. Gupta and N. McKeown, "Algorithms for packet classification, " IEEE Network, vol. 15, no. 2, pp. 24-32, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
30
-
-
33751232321
-
Fast binary and multiway prefix searches for packet forwarding
-
Y.-K. Chang, "Fast binary and multiway prefix searches for packet forwarding," Computer Networks, vol. 51, no. 3, pp. 588-605, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 588-605
-
-
Chang, Y.-K.1
-
32
-
-
0003195066
-
The md5 message-digest algorithm
-
R. Rivest, "The md5 message-digest algorithm," RFC 1321, 1992.
-
(1992)
RFC 1321
-
-
Rivest, R.1
-
33
-
-
1542265638
-
Us secure hash algorithm 1 (sha1)
-
D. Eastlake and P. Jones, "Us secure hash algorithm 1 (sha1)," RFC 3174, 2001.
-
(2001)
RFC 3174
-
-
Eastlake, D.1
Jones, P.2
-
34
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
36
-
-
77953314322
-
-
"Tossim," http://www.cs.berkeley.edu/pal/research/tossim.html.
-
Tossim
-
-
|