-
2
-
-
79957789511
-
Deterministic and efficiently searchable encryption
-
Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill. Deterministic and efficiently searchable encryption. In Proc. CRYPTO, 2007.
-
(2007)
Proc. CRYPTO
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
3
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy and ownership preserving of outsourced medical data. In Proc. ICDE, 2005.
-
(2005)
Proc. ICDE
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
5
-
-
76149103618
-
Casper*: Query processing for location services without compromising privacy
-
Chi-Yin Chow, Mohamed F. Mokbel, and Walid G. Aref. Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems, 34(4), 2009.
-
(2009)
ACM Transactions on Database Systems
, vol.34
, Issue.4
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Aref, W.G.3
-
6
-
-
79957858928
-
Privacy-preserving search and updates for outsourced tree-structured data on untrusted servers
-
Tran Khanh Dang. Privacy-preserving search and updates for outsourced tree-structured data on untrusted servers. In Proc. iTrust, 2005.
-
(2005)
Proc. Itrust
-
-
Dang, T.K.1
-
10
-
-
79957797091
-
Faster point multiplication on elliptic curves with effient endomorphisms
-
Advances in Cryptology-Crypto 2001 Springer-Verlag
-
R. Gallant, R. Lambert, and S. Vanstone. Faster point multiplication on elliptic curves with effient endomorphisms. In Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Gallant, R.1
Lambert, R.2
Vanstone, S.3
-
11
-
-
84886068262
-
Enhanced montgomery multiplication on dsp architectures for embedded public-key cryptosystems
-
April
-
P. Gastaldo, G. Parodi, and R. Zunino. Enhanced montgomery multiplication on dsp architectures for embedded public-key cryptosystems. EURASIP Journal on Embedded Systems, 2008(April), 2008.
-
(2008)
EURASIP Journal on Embedded Systems 2008
-
-
Gastaldo, P.1
Parodi, G.2
Zunino, R.3
-
12
-
-
27944454864
-
Location-privacy in mobile systems: A personalized anonymization model
-
Bugra Gedik and Ling Liu. Location-privacy in mobile systems: A personalized anonymization model. In Proc. ICDCS, 2005.
-
(2005)
Proc. ICDCS
-
-
Gedik, B.1
Liu, L.2
-
13
-
-
35348924316
-
Prive: Anonymous locationbased queries in distributed mobile systems
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos. Prive: Anonymous locationbased queries in distributed mobile systems. In WWW, 2007.
-
(2007)
WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
14
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. Private queries in location based services: Anonymizers are not necessary. In Proc. of SIGMOD, 2008.
-
(2008)
Proc. of SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
16
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. MobiSys, 2003.
-
(2003)
Proc. MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
17
-
-
0000701994
-
Distance browsing in spatial databases
-
Gisli R. Hjaltason and Hanan Samet. Distance browsing in spatial databases. ACM TODS, 24(2):265-318, 1999.
-
(1999)
ACM TODS
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltasond, G.R.1
Samet, H.2
-
18
-
-
67649671762
-
Non-exposure location anonymity
-
Haibo Hu and Jianliang Xu. Non-exposure location anonymity. In Proc. ICDE, 2009.
-
(2009)
Proc. ICDE
-
-
Hu, H.1
Xu, J.2
-
20
-
-
57149125534
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
A. Khoshgozaran and C. Shahabi. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In Proc. SSTD, 2007.
-
(2007)
Proc. SSTD
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
21
-
-
52649088751
-
Privacy preserving joins
-
Yaping Li and Minghua Chen. Privacy preserving joins. In Proc. ICDE, 2008.
-
(2008)
Proc. ICDE
-
-
Li, Y.1
Chen, M.2
-
22
-
-
49749109657
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
K. Liu, C. Giannella, and H. Kargupta. An attacker's view of distance preserving maps for privacy preserving data mining. In Proc. PKDD, 2006.
-
(2006)
Proc. PKDD
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
23
-
-
51849139413
-
Efficient privacy-preserving k-nearest neighbor search
-
Yinian Qi and Mikhail J. Atallah. Efficient privacy-preserving k-nearest neighbor search. In Proc. ICDCS, 2008.
-
(2008)
Proc. ICDCS
-
-
Qi, Y.1
Atallah, M.J.2
-
25
-
-
79957848034
-
Disclosure risks of distance preserving data transformations
-
E. Onur Turgay, Thomas B. Pedersen, Yucel Saygin, Erkay Savas, and Albert Levi. Disclosure risks of distance preserving data transformations. In Proc. SSDBM, 2008.
-
(2008)
Proc. SSDBM
-
-
Turgay, E.O.1
Pedersen, T.B.2
Saygin, Y.3
Savas, E.4
Levi, A.5
-
26
-
-
28444436573
-
Privacy-preserving top-k queries
-
Jaideep Vaidya and Chris Clifton. Privacy-preserving top-k queries. In Proc. ICDE, 2005.
-
(2005)
Proc. ICDE
-
-
Vaidya, J.1
Clifton, C.2
-
27
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
Hui Wang and Laks V. S. Lakshmanan. Efficient secure query evaluation over encrypted XML databases. In Proc. VLDB, 2006.
-
(2006)
Proc. VLDB
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
29
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In Proc. VLDB, 2006.
-
(2006)
Proc. VLDB
-
-
Xiao, X.1
Tao, Y.2
|