-
1
-
-
3142716056
-
Order Preserving Encryption for Numeric Data
-
R. Agrawal, J. Kiernan, R. Srikant, and, Y. Xu, " Order Preserving Encryption for Numeric Data," Proc. ACM SIGMOD Internat. Conf. on Management of Data (SIGMOD '04) (Paris, Fra., 2004), pp. 563-574.
-
(2004)
Proc. ACM SIGMOD Internat. Conf. on Management of Data (SIGMOD '04) (Paris, Fra.)
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
Y. Aumann, and, Y. Lindell, " Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries," Proc. 4th Theory of Cryptography Conf. (TCC '07) (Amsterdam, Nld., 2007) LNCS vol. 4392, pp. 137-156.
-
(2007)
Proc. 4th Theory of Cryptography Conf. (TCC '07) (Amsterdam, Nld.) LNCS 4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
3
-
-
67650690965
-
Order-Preserving Symmetric Encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and, A. O'Neill, " Order-Preserving Symmetric Encryption," Proc. 28th Internat. Conf. on Advances in Cryptology (EUROCRYPT '09) (Cologne, Ger., 2009), LNCS vol. 5479, pp. 224-241.
-
(2009)
Proc. 28th Internat. Conf. on Advances in Cryptology (EUROCRYPT '09) (Cologne, Ger.), LNCS 5479
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
4
-
-
80052002672
-
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
-
A. Boldyreva, N. Chenette, and, A. O'Neill, " Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions," Proc. 31st Conf. on Advances in Cryptology (CRYPTO '11) (Santa Barbara, CA, 2011), LNCS vol. 6841, pp. 578-595.
-
(2011)
Proc. 31st Conf. on Advances in Cryptology (CRYPTO '11) (Santa Barbara, CA), LNCS
, vol.6841
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
5
-
-
77952383756
-
Model-Driven Application-Level Encryption for the Privacy of E-Health Data
-
Y. Ding, and, K. Klein, " Model-Driven Application-Level Encryption for the Privacy of E-Health Data," Proc. 5th Internat. Conf. on Availability, Reliability, and Security (ARES '10) (Krakow, Pol., 2010), pp. 341-346.
-
(2010)
Proc. 5th Internat. Conf. on Availability, Reliability, and Security (ARES '10) (Krakow, Pol.)
, pp. 341-346
-
-
Ding, Y.1
Klein, K.2
-
7
-
-
73349105896
-
Advances and Impact of Secure Function Evaluation
-
V. Kolesnikov, " Advances and Impact of Secure Function Evaluation," Bell Labs Tech. J., 14: 3 (2009), 187-192.
-
(2009)
Bell Labs Tech. J.
, vol.14
, Issue.3
, pp. 187-192
-
-
Kolesnikov, V.1
-
8
-
-
77955348593
-
Ensuring Data Storage Security Against Frequency-Based Attacks in Wireless Networks
-
H. Liu, H. Wang, and, Y. Chen, " Ensuring Data Storage Security Against Frequency-Based Attacks in Wireless Networks," Proc. 6th IEEE Internat. Conf. on Distrib. Comput. in Sensor Syst. (DCOSS '10) (Santa Barbara, CA, 2010), LNCS vol. 6131, pp. 201-215.
-
(2010)
Proc. 6th IEEE Internat. Conf. on Distrib. Comput. in Sensor Syst. (DCOSS '10) (Santa Barbara, CA), LNCS
, vol.6131
, pp. 201-215
-
-
Liu, H.1
Wang, H.2
Chen, Y.3
-
9
-
-
78651068288
-
Security Analysis for Privacy Preserving Search of Multimedia
-
W. Lu, A. L. Varna, and, M. Wu, " Security Analysis for Privacy Preserving Search of Multimedia," Proc. 17th IEEE Internat. Conf. on Image Processing (ICIP '10) (Hong Kong, Hkg., 2010), pp. 2093-2096.
-
(2010)
Proc. 17th IEEE Internat. Conf. on Image Processing (ICIP '10) (Hong Kong, Hkg.)
, pp. 2093-2096
-
-
Lu, W.1
Varna, A.L.2
Wu, M.3
-
10
-
-
82655162816
-
CryptDB: Protecting Confidentiality with Encrypted Query Processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and, H. Balakrishnan, " CryptDB: Protecting Confidentiality with Encrypted Query Processing," Proc. 23rd ACM Symp. on Operating Syst. Principles (SOSP '11) (Cascais, Prt., 2011), pp. 85-100.
-
(2011)
Proc. 23rd ACM Symp. on Operating Syst. Principles (SOSP '11) (Cascais, Prt.)
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
12
-
-
77955905009
-
Secure Ranked Keyword Search over Encrypted Cloud Data
-
C. Wang, N. Cao, J. Li, K. Ren, and, W. Lou, " Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. 30th IEEE Internat. Conf. on Distrib. Comput. Syst. (ICDCS '10) (Genova, Ita., 2010), pp. 253-262.
-
(2010)
Proc. 30th IEEE Internat. Conf. on Distrib. Comput. Syst. (ICDCS '10) (Genova, Ita.)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
13
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A.C.-C. Yao, " How to Generate and Exchange Secrets," Proc. 27th Annual Symp. on Foundations of Comput. Sci. (FOCS '86) (Toronto, Ont., Can., 1986), pp. 162-167.
-
(1986)
Proc. 27th Annual Symp. on Foundations of Comput. Sci. (FOCS '86) (Toronto, Ont., Can.)
, pp. 162-167
-
-
Yao, A.C.-C.1
|