-
1
-
-
67649635197
-
Database management as a service: Challenges and opportunities
-
D. Agrawal, A. El Abbadi, F. Emekci, and A. Metwally. Database management as a service: Challenges and opportunities. In ICDE, 2009.
-
(2009)
ICDE
-
-
Agrawal, D.1
El Abbadi, A.2
Emekci, F.3
Metwally, A.4
-
3
-
-
84881246021
-
System and method of sort-order preserving tokenization
-
US Patent Application 13/450,809
-
G. W. Ang, J. H. Woelfel, and T. P. Woloszyn. System and method of sort-order preserving tokenization. US Patent Application 13/450,809, 2012.
-
(2012)
-
-
Ang, G.W.1
Woelfel, J.H.2
Woloszyn, T.P.3
-
5
-
-
84881250786
-
Dictionary-based order-preserving string compression for main memory column stores
-
C. Binnig, S. Hildenbrand, and F. Färber. Dictionary-based order-preserving string compression for main memory column stores. In ACM SIGMOD, 2009.
-
(2009)
ACM SIGMOD
-
-
Binnig, C.1
Hildenbrand, S.2
Färber, F.3
-
7
-
-
84881219587
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: improved security analysis and alternative solutions. In CRYPTO, 2011.
-
(2011)
CRYPTO
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
8
-
-
57949088292
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography, 2007.
-
(2007)
Theory of Cryptography
-
-
Boneh, D.1
Waters, B.2
-
9
-
-
84881250760
-
-
CipherCloud. Tokenization for cloud data. http://www.ciphercloud.com/ tokenization-cloud-data.aspx.
-
Tokenization for Cloud Data
-
-
-
11
-
-
34249721556
-
Concurrent programming without locks
-
K. Fraser and T. Harris. Concurrent programming without locks. ACM TOCS, 25(2), 2007.
-
(2007)
ACM TOCS
, vol.25
, Issue.2
-
-
Fraser, K.1
Harris, T.2
-
13
-
-
34548786107
-
Fast, secure encryption for indexing in a column-oriented DBMS
-
T. Ge and S. B. Zdonik. Fast, secure encryption for indexing in a column-oriented DBMS. In ICDE, 2007.
-
(2007)
ICDE
-
-
Ge, T.1
Zdonik, S.B.2
-
14
-
-
77954592905
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In ACM STOC, 2009.
-
(2009)
ACM STOC
-
-
Gentry, C.1
-
16
-
-
33750295660
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.
-
(2001)
Basic Tools
, vol.1
-
-
Goldreich, O.1
-
17
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography: Volume II Basic Applications. Cambridge University Press, 2004.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
19
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In ACM SIGMOD, 2002.
-
(2002)
ACM SIGMOD
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
20
-
-
77956795060
-
MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
-
H. Kadhem, T. Amagasa, and H. Kitagawa. MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values. IEICE Trans. on Info. and Systems, E93.D(9), 2010.
-
(2010)
IEICE Trans. on Info. and Systems
, vol.E93.D
, Issue.9
-
-
Kadhem, H.1
Amagasa, T.2
Kitagawa, H.3
-
22
-
-
84871817029
-
On the limits of privacy provided by order-preserving encryption
-
V. Kolesnikov and A. Shikfa. On the limits of privacy provided by order-preserving encryption. Bell Labs Technical Journal, 17(3), 2012.
-
(2012)
Bell Labs Technical Journal
, vol.17
, Issue.3
-
-
Kolesnikov, V.1
Shikfa, A.2
-
23
-
-
77950278191
-
Chaotic order preserving encryption for efficient and secure queries on databases
-
S. Lee, T.-J. Park, D. Lee, T. Nam, and S. Kim. Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. on Info. and Systems, E92.D(11), 2009.
-
(2009)
IEICE Trans. on Info. and Systems
, vol.E92.D
, Issue.11
-
-
Lee, S.1
Park, T.-J.2
Lee, D.3
Nam, T.4
Kim, S.5
-
27
-
-
84881391444
-
Nonlinear order preserving index for encrypted database query in service cloud environments
-
D. Liu and S. Wang. Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency and Computation: Practice and Experience, 2013.
-
(2013)
Concurrency and Computation: Practice and Experience
-
-
Liu, D.1
Wang, S.2
-
28
-
-
84925827178
-
Privacy-preserving logarithmic-time search on encrypted data in cloud
-
Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS, 2012.
-
(2012)
NDSS
-
-
Lu, Y.1
-
29
-
-
0001263548
-
A certified digital signature
-
R. C. Merkle. A certified digital signature. In CRYPTO, 1989.
-
(1989)
CRYPTO
-
-
Merkle, R.C.1
-
31
-
-
84995409596
-
Property preserving symmetric encryption
-
O. Pandey and Y. Rouselakis. Property preserving symmetric encryption. In EUROCRYPT, 2012.
-
(2012)
EUROCRYPT
-
-
Pandey, O.1
Rouselakis, Y.2
-
34
-
-
84881254837
-
An ideal-security protocol for order-preserving encoding
-
Mar.
-
R. A. Popa, F. H. Li, and N. Zeldovich. An ideal-security protocol for order-preserving encoding. Cryptology ePrint Archive, Mar. 2013. http://eprint.iacr.org/.
-
(2013)
Cryptology ePrint Archive
-
-
Popa, R.A.1
Li, F.H.2
Zeldovich, N.3
-
36
-
-
34548774576
-
Multi-dimension range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig. Multi-dimension range query over encrypted data. In IEEE Symposium on Security and Privacy, 2007.
-
IEEE Symposium on Security and Privacy, 2007
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
37
-
-
84881223190
-
-
Vormetric. Cloud encryption. http://www.vormetric.com/products/ encryption/cloud-encryption/.
-
Cloud Encryption
-
-
-
38
-
-
84881248842
-
Extending order preserving encryption for multi-user systems
-
Report 2012/192
-
L. Xiao, I.-L. Yen, and D. T. Huynh. Extending order preserving encryption for multi-user systems. Cryptology ePrint Archive, Report 2012/192, 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Xiao, L.1
Yen, I.-L.2
Huynh, D.T.3
-
39
-
-
84881224278
-
A note for the ideal order-preserving encryption object and generalized order-preserving encryption
-
Report 2012/350
-
L. Xiao, I.-L. Yen, and D. T. Huynh. A note for the ideal order-preserving encryption object and generalized order-preserving encryption. Cryptology ePrint Archive, Report 2012/350, 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Xiao, L.1
Yen, I.-L.2
Huynh, D.T.3
-
40
-
-
84938792503
-
Order-preserving encryption for non-uniformly distributed plaintexts
-
D. Yum, D. Kim, J. Kim, P. Lee, and S. Hong. Order-preserving encryption for non-uniformly distributed plaintexts. In Intl. Workshop on Information Security Applications, 2011.
-
Intl. Workshop on Information Security Applications, 2011
-
-
Yum, D.1
Kim, D.2
Kim, J.3
Lee, P.4
Hong, S.5
|