-
1
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. J. Cryptology, 17(4):297-319, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
2
-
-
33746749406
-
Authenticating multi-dimensional query results in data publishing
-
W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-dimensional Query Results in Data Publishing. In DBSec, pages 60-73, 2006.
-
(2006)
DBSec
, pp. 60-73
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
3
-
-
38049082193
-
Authenticating kNN query results in data publishing
-
W. Cheng and K.-L. Tan. Authenticating kNN Query Results in Data Publishing. In Secure Data Management, pages 47-63, 2007.
-
(2007)
Secure Data Management
, pp. 47-63
-
-
Cheng, W.1
Tan, K.-L.2
-
4
-
-
62749198172
-
Query assurance verification for outsourced multi-dimensional databases
-
W. Cheng and K.-L. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 17(1):101-126, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.1
, pp. 101-126
-
-
Cheng, W.1
Tan, K.-L.2
-
5
-
-
0013458877
-
Batch RSA
-
A. Fiat. Batch RSA. J. Cryptology, 10(2):75-88, 1997.
-
(1997)
J. Cryptology
, vol.10
, Issue.2
, pp. 75-88
-
-
Fiat, A.1
-
6
-
-
0021615874
-
R-trees: A dynamic index structure for spatial searching
-
A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In SIGMOD Conference, pages 47-57, 1984.
-
(1984)
SIGMOD Conference
, pp. 47-57
-
-
Guttman, A.1
-
7
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-service-provider Model. In SIGMOD Conference, pages 216-227, 2002.
-
(2002)
SIGMOD Conference
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
9
-
-
0000701994
-
Distance browsing in spatial databases
-
G. R. Hjaltason and H. Samet. Distance Browsing in Spatial Databases. ACM Trans. Database Syst., 24(2):265-318, 1999.
-
(1999)
ACM Trans. Database Syst.
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltason, G.R.1
Samet, H.2
-
10
-
-
84880209783
-
-
Java SE Security. http://java.sun.com/javase/technologies/security.
-
Java SE Security
-
-
-
11
-
-
85117329200
-
Voronoi-based K nearest neighbor search for spatial network databases
-
M. R. Kolahdouzan and C. Shahabi. Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases. In VLDB, pages 840-851, 2004.
-
(2004)
VLDB
, pp. 840-851
-
-
Kolahdouzan, M.R.1
Shahabi, C.2
-
12
-
-
70350359443
-
Query integrity assurance of location-based services accessing outsourced spatial databases
-
W.-S. Ku, L. Hu, C. Shahabi, and H. Wang. Query integrity assurance of location-based services accessing outsourced spatial databases. In SSTD, pages 80-97, 2009.
-
(2009)
SSTD
, pp. 80-97
-
-
Ku, W.-S.1
Hu, L.2
Shahabi, C.3
Wang, H.4
-
13
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD Conference, pages 121-132, 2006.
-
(2006)
SIGMOD Conference
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
14
-
-
58149462240
-
Partially materialized digest scheme: An efficient verification method for outsourced databases
-
K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. VLDB J., 18(1):363-381, 2009.
-
(2009)
VLDB J.
, vol.18
, Issue.1
, pp. 363-381
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
15
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. In NDSS, 2004.
-
(2004)
NDSS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
16
-
-
35048891654
-
Signature bouquets: Immutability for aggregated/condensed signatures
-
E. Mykletun, M. Narasimha, and G. Tsudik. Signature Bouquets: Immutability for Aggregated/Condensed Signatures. In ESORICS, pages 160-176, 2004.
-
(2004)
ESORICS
, pp. 160-176
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
17
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. TOS, 2(2):107-138, 2006.
-
(2006)
TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
18
-
-
0742311715
-
Spatial tessellations: Concepts and applications of voronoi diagrams
-
Wiley, NYC, 2nd edition
-
A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams. Probability and Statistics. Wiley, NYC, 2nd edition, 2000.
-
(2000)
Probability and Statistics
-
-
Okabe, A.1
Boots, B.2
Sugihara, K.3
Chiu, S.N.4
-
19
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In SIGMOD Conference, pages 407-418, 2005.
-
(2005)
SIGMOD Conference
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
20
-
-
2442590644
-
Authenticating query results in edge computing
-
H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In ICDE, pages 560-571, 2004.
-
(2004)
ICDE
, pp. 560-571
-
-
Pang, H.1
Tan, K.-L.2
-
21
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
H. Pang, J. Zhang, and K. Mouratidis. Scalable Verification for Outsourced Dynamic Databases. PVLDB, 2(1):802-813, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
22
-
-
70350362298
-
Continuous spatial authentication
-
S. Papadopoulos, Y. Yang, S. Bakiras, and D. Papadias. Continuous Spatial Authentication. In SSTD, pages 62-79, 2009.
-
(2009)
SSTD
, pp. 62-79
-
-
Papadopoulos, S.1
Yang, Y.2
Bakiras, S.3
Papadias, D.4
-
24
-
-
78650614611
-
VoR-tree: R-trees with voronoi diagrams for efficient processing of spatial nearest neighbor queries
-
M. Sharifzadeh and C. Shahabi. VoR-tree: R-trees with Voronoi Diagrams for Efficient Processing of Spatial Nearest Neighbor Queries. PVLDB, 3(1), 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
-
-
Sharifzadeh, M.1
Shahabi, C.2
-
25
-
-
33745601730
-
Query execution assurance for outsourced databases
-
R. Sion. Query Execution Assurance for Outsourced Databases. In VLDB, pages 601-612, 2005.
-
(2005)
VLDB
, pp. 601-612
-
-
Sion, R.1
-
27
-
-
70349251911
-
Dual encryption for query integrity assurance
-
H. Wang, J. Yin, C.-S. Perng, and P. S. Yu. Dual Encryption for Query Integrity Assurance. In CIKM, pages 863-872, 2008.
-
(2008)
CIKM
, pp. 863-872
-
-
Wang, H.1
Yin, J.2
Perng, C.-S.3
Yu, P.S.4
-
28
-
-
84997556980
-
Integrity auditing of outsourced data
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity Auditing of Outsourced Data. In VLDB, pages 782-793, 2007.
-
(2007)
VLDB
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
29
-
-
52649150749
-
Spatial outsourcing for location-based services
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial Outsourcing for Location-based Services. In ICDE, pages 1082-1091, 2008.
-
(2008)
ICDE
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
30
-
-
67649510426
-
Authenticated indexing for outsourced spatial databases
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated Indexing for Outsourced Spatial Databases. VLDB J., 18(3):631-648, 2009.
-
(2009)
VLDB J.
, vol.18
, Issue.3
, pp. 631-648
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
|