-
1
-
-
77956137294
-
Cryptographic cloud storage
-
Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization
-
S. Kamara and K. Lauter. Cryptographic cloud storage. In Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, LNCS 6054, pages 136-149, 2010.
-
(2010)
LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
2
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In Proceedings of the 35th SIGMOD, pages 139-152, 2009.
-
(2009)
Proceedings of the 35th SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
4
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In IEEE 27th International Conference on Data Engineering (ICDE), pages 601-612, 2011.
-
(2011)
IEEE 27th International Conference on Data Engineering (ICDE)
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
5
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3):333-358, 2012.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
6
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, and K.M.R. Urs. Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings of IEEE INFOCOM, pages 451-459, 2012.
-
(2012)
Proceedings of IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
7
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8):1467-1479, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
8
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. In 30th IEEE International Conference on Distributed Computing Systems (ICDCS), pages 253-262, 2010.
-
(2010)
30th IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
51849103902
-
Privacy preserving nearest neighbor search
-
M. Shaneck, Y. Kim, and V. Kumar. Privacy preserving nearest neighbor search. In IEEE ICDM Workshops, pages 541-545, 2006.
-
(2006)
IEEE ICDM Workshops
, pp. 541-545
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
13
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pages 829-837, 2011.
-
(2011)
Proceedings of IEEE International Conference on Computer Communications (INFOCOM)
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
14
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
IEEE
-
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou. Privacy-preserving query over encrypted graph-structured data in cloud computing. In 31st International Conference on Distributed Computing Systems (ICDCS), pages 393-402.IEEE, 2011.
-
(2011)
31st International Conference on Distributed Computing Systems (ICDCS)
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
15
-
-
84866351451
-
Toward privacy-assured cloud data services with flexible search functionalities
-
M. Li, S. Yu, W. Lou, and Y.T. Hou. Toward privacy-assured cloud data services with flexible search functionalities. In IEEE ICDCS Workshops, pages 466-470, 2012.
-
(2012)
IEEE ICDCS Workshops
, pp. 466-470
-
-
Li, M.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
19
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with an honest majority
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with an honest majority. In Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229. ACM Press, 1987.
-
(1987)
Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO, pages 129-140. Springer, 1991.
-
(1991)
CRYPTO
, pp. 129-140
-
-
Pedersen, T.1
-
21
-
-
33745567199
-
-
I. Damgård, M. Fitzi, E. Kiltz, J. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. pages 285-304, 2006.
-
(2006)
Unconditionally Secure Constant-rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
EUROCRYPT, Springer
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238. LNCS 1592, Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
77954631038
-
A survey of attack techniques on privacy-preserving data perturbation methods
-
Springer
-
K. Liu, C. Giannella, and H. Kargupta. A survey of attack techniques on privacy-preserving data perturbation methods. In Privacy-Preserving Data Mining, pages 359-381. Springer, 2008.
-
(2008)
Privacy-Preserving Data Mining
, pp. 359-381
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
|