-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 563-574. ACM, 2004.
-
(2004)
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
H. Krawczyk, editor Springer
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO 1998, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer, 1998.
-
(1998)
Advances in Cryptology - CRYPTO 1998, Volume 1462 of Lecture Notes in Computer Science
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
4
-
-
67650690965
-
Order-preserving symmetric encryption
-
Antoine Joux, editor Springer
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Antoine Joux, editor, Advances in Cryptology - EUROCRYPT 2009, volume 5479 of Lecture Notes in Computer Science, pages 224-241. Springer, 2009.
-
(2009)
Advances in Cryptology - EUROCRYPT 2009, Volume 5479 of Lecture Notes in Computer Science
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
C. Cachin and J. Camenisch, editors Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004, Volume 3027 of Lecture Notes in Computer Science
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In TCC'07: Proceedings of the 4th conference on Theory of cryptography, volume 4392 of Lecture Notes in Computer Science, pages 535-554. Springer, 2007.
-
(2007)
TCC'07: Proceedings of the 4th Conference on Theory of Cryptography, Volume 4392 of Lecture Notes in Computer Science
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212. ACM, 2009.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
IEEE Computer Society
-
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In 2007 IEEE Symposium on Security and Privacy, pages 350-364. IEEE Computer Society, 2007.
-
(2007)
2007 IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
|