-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD, pages 563-574, 2004.
-
(2004)
SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
79959972183
-
TrustedDB: a trusted hardware based database with privacy and data confidentiality
-
S. Bajaj and R. Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, pages 205-216, 2011.
-
(2011)
SIGMOD
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
3
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of ACM, 45(6):965-981, 1998.
-
(1998)
Journal of ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In CCS, pages 93-102, 2003.
-
(2003)
CCS
, pp. 93-102
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In ICDCS, pages 710-719, 2011.
-
(2011)
ICDCS
, pp. 710-719
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
6
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
T. Ge and S. B. Zdonik. Answering aggregation queries in a secure system model. In VLDB, pages 519-530, 2007.
-
(2007)
VLDB
, pp. 519-530
-
-
Ge, T.1
Zdonik, S.B.2
-
7
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Communication of ACM, 53:97-105, 2010.
-
(2010)
Communication of ACM
, vol.53
, pp. 97-105
-
-
Gentry, C.1
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database service provider model. In SIGMOD, pages 216-227, 2002.
-
(2002)
SIGMOD
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
9
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720-731, 2004.
-
(2004)
VLDB
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
10
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS, pages 364-373, 1997.
-
(1997)
FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
11
-
-
84857066233
-
Revisiting the computational practicality of private information retrieval
-
F. G. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Financial Cryptography, pages 158-172, 2011.
-
(2011)
Financial Cryptography
, pp. 158-172
-
-
Olumofin, F.G.1
Goldberg, I.2
-
12
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514-523, 1990.
-
(1990)
STOC
, pp. 514-523
-
-
Ostrovsky, R.1
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
82655162816
-
CryptDB: protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In SOSP, pages 85-100, 2011.
-
(2011)
SOSP
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
15
-
-
74049152260
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199-212, 2009.
-
(2009)
CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
16
-
-
85039656427
-
-
On the computational practicality of private information retrieval
-
R. Sion and B. Carbunar. On the computational practicality of private information retrieval. In NDSS Symposium, 2007.
-
(2007)
NDSS Symposium
-
-
Sion, R.1
Carbunar, B.2
-
17
-
-
77958461266
-
Generalizing pir for practical private retrieval of public data
-
S. Wang, D. Agrawal, and A. E. Abbadi. Generalizing pir for practical private retrieval of public data. In DBSec, pages 1-16, 2010.
-
(2010)
DBSec
, pp. 1-16
-
-
Wang, S.1
Agrawal, D.2
Abbadi, A.E.3
-
18
-
-
80052699824
-
A comprehensive framework for secure query processing on relational data in the cloud
-
S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, pages 52-69, 2011.
-
(2011)
SDM
, pp. 52-69
-
-
Wang, S.1
Agrawal, D.2
El Abbadi, A.3
-
19
-
-
85039656902
-
-
Usable private information retrieval
-
P. Williams and R. Sion. Usable private information retrieval. In NDSS Symposium, 2008.
-
(2008)
NDSS Symposium
-
-
Williams, P.1
Sion, R.2
|