-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of ACM SIGMOD 2004, Paris, France (June 2004)
-
Proc. of ACM SIGMOD 2004, Paris, France (June 2004)
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 8(1), 119-152 (2005)
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
4
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. JACM 45(6), 965-981 (1998)
-
(1998)
JACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
5
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
Proc. of ACSAC 2008, Anaheim, CA, USA (December 2008)
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
6
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of ICDCS 2009, Montreal, Canada (June 2009)
-
Proc. of ICDCS 2009, Montreal, Canada (June 2009)
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
7
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
79951510303
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
Proc. of CCS 2003, Washington, DC, USA (October 2003)
-
-
Damiani, E.1
De Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1-12:46 (2010)
-
(2010)
ACM TODS
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
80051865953
-
Efficient and private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011, Minneapolis, MN, USA (June 2011)
-
Proc. of ICDCS 2011, Minneapolis, MN, USA (June 2011)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
11
-
-
4644223618
-
Accuracy and performance of biometric systems
-
Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proc. of IMTC 2004, Como, Italy (May 2004)
-
Proc. of IMTC 2004, Como, Italy (May 2004)
-
-
Gamassi, M.1
Lazzaroni, M.2
Misino, M.3
Piuri, V.4
Sana, D.5
Scotti, F.6
-
12
-
-
84927600695
-
Robust fingerprint detection for access control
-
Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)
-
Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
13
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. JACM 43(3), 431-473 (1996)
-
(1996)
JACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
14
-
-
0036204131
-
Providing database as a service
-
Hacigümüs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002, San Jose, CA, USA (February 2002)
-
Proc. of ICDE 2002, San Jose, CA, USA (February 2002)
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
15
-
-
85134315029
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD 2002, Madison, WI, USA (June 2002)
-
Proc. of SIGMOD 2002, Madison, WI, USA (June 2002)
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
16
-
-
0003834102
-
-
Prentice-Hall, Inc., Upper Saddle River
-
Lazowska, E., Zahorjan, J., Graham, G., Sevcik, K.: Quantitative system performance: Computer system analysis using queueing network models. Prentice-Hall, Inc., Upper Saddle River (1984)
-
(1984)
Quantitative System Performance: Computer System Analysis Using Queueing Network Models
-
-
Lazowska, E.1
Zahorjan, J.2
Graham, G.3
Sevcik, K.4
-
18
-
-
77955434225
-
Privacy-preserving queries over relational databases
-
Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
-
Olumofin, F., Goldberg, I.: Privacy-preserving queries over relational databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75-92. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6205
, pp. 75-92
-
-
Olumofin, F.1
Goldberg, I.2
-
19
-
-
77954749319
-
Token-based cloud computing
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Sadeghi, A., Schneider, T., Winandy, M.: Token-based cloud computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 417-429. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 417-429
-
-
Sadeghi, A.1
Schneider, T.2
Winandy, M.3
-
20
-
-
85165838451
-
Designing secure indexes for encrypted databases
-
Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Proc. of IFIP DBSec 2005, Storrs, CT, USA (August 2005)
-
Proc. of IFIP DBSec 2005, Storrs, CT, USA (August 2005)
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
22
-
-
85165854972
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: Proc of CCS 2008, Alexandria, VA, USA (October 2008)
-
Proc of CCS 2008, Alexandria, VA, USA (October 2008)
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
|