-
1
-
-
78751486819
-
-
AES (2001). Advanced encryption standard. National Institute of Science and Technology, FIPS 197
-
AES (2001). Advanced encryption standard. National Institute of Science and Technology, FIPS 197.
-
-
-
-
2
-
-
3142716056
-
Order preserving encryption for numeric data
-
New York, NY, USA. ACM
-
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004). Order preserving encryption for numeric data. In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 563-574, New York, NY, USA. ACM.
-
(2004)
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0021522644
-
How to generate crypto-graphically strong sequences of pseudo-random bits
-
Blum, M. and Micali, S. (1984). How to generate crypto-graphically strong sequences of pseudo-random bits. SIAM J. Comput., 13 (4): 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword search. In EUROCRYPT 2004: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, pages 506-522. Springer.
-
(2004)
EUROCRYPT 2004: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
84991010622
-
Anti-tamper databases: Processing aggregate queries over encrypted databases
-
Washington, DC, USA IEEE Computer Society
-
Chung, S. S. and Ozsoyoglu, G. (2006). Anti-tamper databases: Processing aggregate queries over encrypted databases. In ICDEW '06: Proceedings of International Conference on Data Engineering Workshops, page 98, Washington, DC, USA. IEEE Computer Society.
-
(2006)
ICDEW '06: Proceedings of International Conference on Data Engineering Workshops
, pp. 98
-
-
Chung, S.S.1
Ozsoyoglu, G.2
-
6
-
-
0003508568
-
-
DES. Federal Information Processing Standards Publication, FIPS PUB 46
-
DES (1977). Data encryption standard. Federal Information Processing Standards Publication, FIPS PUB 46.
-
(1977)
Data Encryption Standard
-
-
-
7
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Berlin, Heidelberg Springer-Verlag
-
Dong, C, Russello, G., and Dulay, N. (2008). Shared and searchable encrypted data for untrusted servers. In Proceeedings of the 22nd annual IFIP working conference on Data and Applications Security, pages 127-143, Berlin, Heidelberg. Springer-Verlag.
-
(2008)
Proceeedings of the 22nd Annual IFIP Working Conference on Data and Applications Security
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
New York, NY, USA. ACM
-
Hacigümüş, H., Iyer, B., Li, C, and Mehrotra, S. (2002). Executing SQL over encrypted data in the database-service-provider model. In SIGMOD '02: Proceedings of the 2002 ACM SIGMOD international conference on Management of data, pages 216-227, New York, NY, USA. ACM.
-
(2002)
SIGMOD '02: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
9
-
-
85065578926
-
A privacy-preserving index for range queries
-
VLDB Endowment
-
Höre, B., Mehrotra, S., and Tsudik, G. (2004). A privacy-preserving index for range queries. In VLDB 04: Proceedings of the 30th international conference on Very large databases, pages 720-731. VLDB Endowment.
-
(2004)
VLDB 04: Proceedings of the 30th International Conference on Very Large Databases
, pp. 720-731
-
-
Höre, B.1
Mehrotra, S.2
Tsudik, G.3
-
10
-
-
77956855625
-
Database encryption in SQL server 2008 enterprise edition
-
February, SQL Server 2008
-
Hsueh, S. (February 2008). Database encryption in SQL server 2008 enterprise edition. Microsoft White Papers, SQL Server 2008.
-
(2008)
Microsoft White Papers
-
-
Hsueh, S.1
-
11
-
-
77956795060
-
MV-OPES: Multivalued - Order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
-
accepted
-
Kadhem, H., Amagasa, T., and Kitagawa, H. (2010). MV-OPES: Multivalued - order preserving encryption scheme: A novel scheme for encrypting integer value to many different values. IEICE Transactions, 93-D(9):accepted.
-
(2010)
IEICE Transactions
, vol.93 D
, Issue.9
-
-
Kadhem, H.1
Amagasa, T.2
Kitagawa, H.3
-
12
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL, USA
-
Menezes, A. J., Vanstone, S. A., and Oorschot, P. C. V. (1996). Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
13
-
-
26444613146
-
Anti-tamper databases: Querying encrypted databases
-
Ozsoyoglu, G., Singer, D. A., and Chung, S. S. (2003). Anti-tamper databases: Querying encrypted databases. In 17th Annual IFIP Working Conference on Database and Applications Security, Estes Park, pages 4-6.
-
(2003)
17th Annual IFIP Working Conference on Database and Applications Security, Estes Park
, pp. 4-6
-
-
Ozsoyoglu, G.1
Singer, D.A.2
Chung, S.S.3
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2): 120-126.
-
(1978)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
London, UK Springer-Verlag
-
Schneier, B. (1994). Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption, Cambridge Security Workshop, pages 191-204, London, UK. Springer-Verlag.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop
, pp. 191-204
-
-
Schneier, B.1
-
16
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Washington, DC, USA. IEEE Computer Society
-
Song, D. X., Wagner, D., and Perrig, A. (2000). Practical techniques for searches on encrypted data. In SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 44, Washington, DC, USA. IEEE Computer Society.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
|