-
1
-
-
70849131456
-
Secure kNN Computation on Encrypted Databases
-
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN Computation on Encrypted Databases. In: ACM SIGMOD International Conference on Management of Data, pp. 139-152 (2009)
-
(2009)
ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
2
-
-
3142716056
-
Order Preserving Encryption for Numeric Data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: ACM SIGMOD International Conference on Management of Data, pp. 563-574 (2004)
-
(2004)
ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
38049045519
-
Conjunctive, Subset, and Range Queries on Encrypted Data
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Theory of Cryptography Conference, pp. 535-554 (2007)
-
(2007)
Theory of Cryptography Conference
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
4
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems 19(3), 332-383 (2001)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
6
-
-
78049409136
-
-
Akamai, http://www.akamai.com
-
-
-
-
7
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: ACM SIGMOD International Conference on Management of Data, pp. 216-227 (2002)
-
(2002)
ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
8
-
-
0036204131
-
Providing database as a service
-
Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: ICDE International Conference on Data Engineering, pp. 29-38 (2002)
-
(2002)
ICDE International Conference on Data Engineering
, pp. 29-38
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
9
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. Springer, Heidelberg
-
Liu, K., Giannella, C., Kargupta, H.: An attacker's view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297-308. Springer, Heidelberg (2006)
-
(2006)
LNCS (LNAI)
, vol.4213
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
10
-
-
70349244709
-
Secure Aggregation in a Publish-Subscribe System
-
Minami, K., Lee, A.J., Winslett, M., Borisov, N.: Secure Aggregation in a Publish-Subscribe System. In: ACM Workshop on Privacy in the Electronic Society, pp. 95-104 (2008)
-
(2008)
ACM Workshop on Privacy in the Electronic Society
, pp. 95-104
-
-
Minami, K.1
Lee, A.J.2
Winslett, M.3
Borisov, N.4
-
14
-
-
81155153612
-
Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems
-
Purdue University, West Lafayette, IN
-
Nabeel, M., Shang, N., Bertino, E.: Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems. CERIAS Tech. Report 2009-15, Purdue University, West Lafayette, IN
-
CERIAS Tech. Report 2009-15
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
15
-
-
24144477340
-
Security Issues and Requirements for Internet-Scale Publish-Subsribe Systems
-
Wang, C., Carzaniga, A., Evans, D., Wolf, A.L.: Security Issues and Requirements for Internet-Scale Publish-Subsribe Systems. In: Hawaii International Conference on System Sciences, pp. 303-310 (2002)
-
(2002)
Hawaii International Conference on System Sciences
, pp. 303-310
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
16
-
-
33644536683
-
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems
-
Khurana, H.: Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems. In: ACM Symposium on Applied Computing, pp. 801-807 (2005)
-
(2005)
ACM Symposium on Applied Computing
, pp. 801-807
-
-
Khurana, H.1
-
17
-
-
34548774576
-
Multi-Dimensional Range Query over Encrypted Data
-
Shi, E., Bethenourt, J., Hubert Chan, T.-H., Song, D., Perrig, A.: Multi-Dimensional Range Query over Encrypted Data. In: IEEE Symposium on Security and Privacy, pp. 350-364 (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethenourt, J.2
Hubert Chan, T.-H.3
Song, D.4
Perrig, A.5
-
18
-
-
34548024416
-
Encryption-Enforced Access Control in Dynamic Multi-Domain Publish/Subscribe Networks
-
Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Encryption-Enforced Access Control in Dynamic Multi-Domain Publish/Subscribe Networks. In: International Conference on Distributed Event-Based Systems, pp. 104-115 (2007)
-
(2007)
International Conference on Distributed Event-Based Systems
, pp. 104-115
-
-
Pesonen, L.I.W.1
Eyers, D.M.2
Bacon, J.3
-
19
-
-
85065578926
-
A Privacy-Preserving Index for Range Queries
-
Hore, B., Mehrotra, S., Tsudik, G.: A Privacy-Preserving Index for Range Queries. In: International Conference on Very Large Data Bases, pp. 720-731 (2004)
-
(2004)
International Conference on Very Large Data Bases
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
21
-
-
84942550998
-
Public-key cryptosystem based on composite degree residuosity classes
-
Paillier, P.: Public-key cryptosystem based on composite degree residuosity classes. In: Advances in Cryptology, pp. 223-238 (1999)
-
(1999)
Advances in Cryptology
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
|