-
1
-
-
84861183061
-
-
AES: Advanced Encryption Standard. FIPS 197, Computer Security Resource Center, National Institute of Standards and Technology
-
AES: Advanced Encryption Standard. FIPS 197, Computer Security Resource Center, National Institute of Standards and Technology (2001). http://en. wikipedia. org/wiki/Advanced_EncryptionStandard.
-
(2001)
-
-
-
2
-
-
84863338303
-
-
In: CIDR
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: a distributed architecture for secure database services. In: CIDR (2005).
-
(2005)
Two can keep a secret: A distributed architecture for secure database services
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Srivastava, U.6
Thomas, D.7
Xu, Y.8
-
3
-
-
33749642794
-
-
In: ICDE
-
Agrawal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: ICDE (2006).
-
(2006)
Sovereign joins
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
4
-
-
3142716056
-
-
In: SIGMOD
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: SIGMOD (2004).
-
(2004)
Order-preserving encryption for numeric data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
6
-
-
77952396605
-
-
In: EUROCRYPT
-
Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A.: Order-preserving symmetric encryption. In: EUROCRYPT (2009).
-
(2009)
Order-preserving symmetric encryption
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
8
-
-
35048892905
-
-
In: EUROCRYPT
-
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key encryption with keyword search. In: EUROCRYPT (2004).
-
(2004)
Public-key encryption with keyword search
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
80051865953
-
-
In: ICDCS
-
Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: ICDCS (2011).
-
(2011)
Efficient and private access to outsourced data
-
-
Capitani di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
16
-
-
18744366643
-
-
In: CCS
-
Damiani, E., Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: CCS (2003).
-
(2003)
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
-
Damiani, E.1
Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
19
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Gentry, C.: Computing arbitrary functions of encrypted data. CACM 53(3) (2010).
-
(2010)
CACM
, vol.53
, Issue.3
-
-
Gentry, C.1
-
20
-
-
33244488406
-
-
Unpubished manuscript
-
Goh, E.: Secure Indexes. Unpubished manuscript (2003).
-
(2003)
Secure Indexes
-
-
Goh, E.1
-
23
-
-
0036361105
-
-
In: SIGMOD
-
Haci{dotless}gümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in database service provider model. In: SIGMOD (2002).
-
(2002)
Executing sql over encrypted data in database service provider model
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
27
-
-
70349131769
-
Flexible anonymization for privacy preserving data publishing: A systematic search based approach
-
Hore, B., Jammalamadaka, R. C., Mehrotra, S.: Flexible anonymization for privacy preserving data publishing: a systematic search based approach. In: Siam Conference on Data Mining (2007).
-
(2007)
Siam Conference on Data Mining
-
-
Hore, B.1
Jammalamadaka, R.C.2
Mehrotra, S.3
-
28
-
-
84861183065
-
-
ICS technical report, UCI
-
Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure Multidimensional Range Queries Over Outsourced Data (extended version). ICS technical report, UCI, http://www. ics. uci. edu/~bhore/papers/range-queries-in-das(journal-extended). pdf.
-
Secure Multidimensional Range Queries Over Outsourced Data (extended version)
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
35
-
-
33749607006
-
-
In: ICDE
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: privacy beyond K-Anonymity. In: ICDE (2006).
-
(2006)
L-Diversity: Privacy beyond K-Anonymity
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
36
-
-
84861187736
-
-
In: ICDT
-
Muthukrishnan, S., Poosala, V., Suel, T.: On rectangular partitionings in two dimensions: algorithms, complexity and applications. In: ICDT (1997).
-
(1997)
On rectangular partitionings in two dimensions: Algorithms, complexity and applications
-
-
Muthukrishnan, S.1
Poosala, V.2
Suel, T.3
-
37
-
-
10644253543
-
Approximation algorithms for array partitioning problems
-
Muthukrishnan S., Suel T.: Approximation algorithms for array partitioning problems. J. Algorithms 54, 85-104 (2005).
-
(2005)
J. Algorithms
, vol.54
, pp. 85-104
-
-
Muthukrishnan, S.1
Suel, T.2
-
40
-
-
0030157406
-
-
In: SIGMOD
-
Poosala, V., Ioannidis, Y., Haas, P. J., Shekita, E. J.: Improved histograms for selectivity estimation of range predicates. In: SIGMOD (1996).
-
(1996)
Improved histograms for selectivity estimation of range predicates
-
-
Poosala, V.1
Ioannidis, Y.2
Haas, P.J.3
Shekita, E.J.4
-
41
-
-
0035517699
-
Protecting respondents' identities in microdata Release
-
Samarati, P.: Protecting respondents' identities in microdata Release. IEEE TKDE 13(6) (2001).
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
-
-
Samarati, P.1
-
43
-
-
34548774576
-
-
Shi, E., Bethencourt, J., Chan, H. T.-H., Song, D. X., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE S&P (2007).
-
(2007)
Multi-dimensional range query over encrypted data. In: IEEE S&P
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
-
45
-
-
0036811143
-
Achieving K-anonymity privacy protection using generalization and suppression
-
Sweeney, L.: Achieving K-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzz Knowl Base Syst (2002).
-
(2002)
Int J Uncertain Fuzz Knowl Base Syst
-
-
Sweeney, L.1
-
51
-
-
70849131456
-
-
In: SIGMOD
-
Wong, W. K., Cheung, D. W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD (2009).
-
(2009)
Secure kNN computation on encrypted databases
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
52
-
-
24344436696
-
-
In: ICNP
-
Xu, J., Fan, J., Ammar, M. H., Moon, S. B.: Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography based scheme. In: ICNP (2002).
-
(2002)
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography based scheme
-
-
Xu, J.1
Fan, J.2
Ammar, M.H.3
Moon, S.B.4
-
53
-
-
77953139328
-
Enabling search services on outsourced private spatial data
-
Yiu M. L., Ghinita G., Jensen C. S., Kalnis P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363-384 (2010).
-
(2010)
VLDB J.
, vol.19
, Issue.3
, pp. 363-384
-
-
Yiu, M.L.1
Ghinita, G.2
Jensen, C.S.3
Kalnis, P.4
|