-
2
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proc. ACM SIGMOD, pages 563-574, 2004.
-
(2004)
Proc. ACM SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
4243997063
-
Permutation entropy: A natural complexity measure for time series
-
Apr
-
C. Bandt and B. Pompe. Permutation entropy: A natural complexity measure for time series. Phys. Rev. Lett., 88:174102, Apr 2002.
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 174102
-
-
Bandt, C.1
Pompe, B.2
-
4
-
-
67650690965
-
Order-preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Proc. EUROCRYPT, pages 224-241, 2009.
-
(2009)
Proc. EUROCRYPT
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
5
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. TCC, pages 535-554, 2007.
-
(2007)
Proc. TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
6
-
-
0017216776
-
Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms
-
K. S. Booth and G. S. Lueker. Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms. J. Comput. System Sci., 13(3):335-379, 1976.
-
(1976)
J. Comput. System Sci.
, vol.13
, Issue.3
, pp. 335-379
-
-
Booth, K.S.1
Lueker, G.S.2
-
7
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
DOI 10.1145/1053283.1053289
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur., 8(1):119-152, 2005. (Pubitemid 40479431)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
8
-
-
79952779059
-
RASP: Efficient multidimensional range query on attack-resilient encrypted databases
-
K. Chen, R. Kavuluru, and S. Guo. RASP: efficient multidimensional range query on attack-resilient encrypted databases. In Proc. ACM CODASPY, pages 249-260, 2011.
-
(2011)
Proc. ACM CODASPY
, pp. 249-260
-
-
Chen, K.1
Kavuluru, R.2
Guo, S.3
-
9
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proc. ACM CCSW, pages 85-90, 2009.
-
(2009)
Proc. ACM CCSW
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
10
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
V. Ciriani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality. Proc. ESORICS, pages 440-455, 2009.
-
(2009)
Proc. ESORICS
, pp. 440-455
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. ACM CCS, pages 93-102, 2003.
-
(2003)
Proc. ACM CCS
, pp. 93-102
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
85172049273
-
Security limitations of using secret sharing for data outsourcing
-
J. Dautrich and C. Ravishankar. Security limitations of using secret sharing for data outsourcing. In Proc. DBSec, 2012.
-
Proc. DBSec, 2012
-
-
Dautrich, J.1
Ravishankar, C.2
-
13
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In Proc. ICDCS, 2011.
-
Proc. ICDCS, 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
14
-
-
0342917767
-
Solution of the value-independent knapsack problem by partitioning
-
B. Faaland. Solution of the value-independent knapsack problem by partitioning. Operations Research, 21(1):332-337, 1973.
-
(1973)
Operations Research
, vol.21
, Issue.1
, pp. 332-337
-
-
Faaland, B.1
-
15
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. ACM SIGMOD, pages 216-227, 2002.
-
(2002)
Proc. ACM SIGMOD
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
16
-
-
85172054762
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, pages 1-26, 2011.
-
(2011)
The VLDB Journal
, pp. 1-26
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
17
-
-
26444442384
-
Security issues in querying encrypted data
-
M. Kantarcioglu and C. Clifton. Security issues in querying encrypted data. In Proc. DBSec, pages 325-337, 2005.
-
(2005)
Proc. DBSec
, pp. 325-337
-
-
Kantarcioglu, M.1
Clifton, C.2
-
18
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proc. EUROCRYPT, pages 146-162, 2008.
-
(2008)
Proc. EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
26444524370
-
Efficiency and security trade-off in supporting range queries on encrypted databases
-
J. Li and E. Omiecinski. Efficiency and security trade-off in supporting range queries on encrypted databases. In Proc. DBSec, pages 69-83, 2005.
-
(2005)
Proc. DBSec
, pp. 69-83
-
-
Li, J.1
Omiecinski, E.2
-
20
-
-
84921683893
-
Authorized private keyword search over encrypted personal health records in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted personal health records in cloud computing. In Proc. ICDCS, 2011.
-
Proc. ICDCS, 2011
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
21
-
-
84876798589
-
Hiding tree structured data and queries from untrusted data stores
-
P. Lin and K. Candan. Hiding tree structured data and queries from untrusted data stores. Information Systems Security, 14(4):10, 2005.
-
(2005)
Information Systems Security
, vol.14
, Issue.4
, pp. 10
-
-
Lin, P.1
Candan, K.2
-
22
-
-
34248181923
-
l-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM TKDD, 1(1):3-es, 2007.
-
(2007)
ACM TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
23
-
-
33746748166
-
Aggregation queries in the database-as-a-service model
-
E. Mykletun and G. Tsudik. Aggregation queries in the database-as-a-service model. In Proc. DBSec, pages 89-103, 2006.
-
(2006)
Proc. DBSec
, pp. 89-103
-
-
Mykletun, E.1
Tsudik, G.2
-
24
-
-
85172058163
-
Revisiting the computational practicality of private information retrieval
-
F. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Proc. FC, 2011.
-
Proc. FC, 2011
-
-
Olumofin, F.1
Goldberg, I.2
-
25
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
P. Samarati and S. De Capitani di Vimercati. Data protection in outsourcing scenarios: issues and directions. In Proc. ASIACCS, pages 1-14, 2010.
-
(2010)
Proc. ASIACCS
, pp. 1-14
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
26
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Proc. TCC, pages 457-473, 2009.
-
(2009)
Proc. TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
27
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Proc. IEEE S&P, pages 350-364, 2007.
-
(2007)
Proc. IEEE S&P
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.3
Song, D.4
Perrig, A.5
-
29
-
-
43749097236
-
A secure multi-dimensional partition based index in DAS. In
-
J. Wang and X. Du. A secure multi-dimensional partition based index in DAS. In Proc. APWeb, pages 319-330, 2008.
-
(2008)
Proc. APWeb
, pp. 319-330
-
-
Wang, J.1
Du, X.2
-
30
-
-
33750247597
-
Privacy-preserving queries on encrypted data
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving queries on encrypted data. In Proc. ESORICS, pages 479-495, 2006.
-
(2006)
Proc. ESORICS
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
|