-
1
-
-
3142716056
-
-
ACM SIGMOD, Paris, France, June 2004
-
R. Agrawal, J. Kierman, R. Srikant and Y. Xu, Order preserving encryption for numeric data, in: Proc. of ACM SIGMOD 2004, Paris, France, June 2004.
-
(2004)
Order Preserving Encryption for Numeric Data, In: Proc. of
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0001090406
-
-
Prague, Czech Republic, May 1999
-
C. Cachin, S. Micali and M. Stadler, Computationally private information retrieval with polylogarithmic communication, in: Proc. of EUROCRYPT 1999, Prague, Czech Republic, May 1999.
-
(1999)
Computationally Private Information Retrieval with Polylogarithmic Communication, In: Proc. of EUROCRYPT
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
4
-
-
16644381926
-
-
ACM TISSEC
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi and P. Samarati, Modeling and assessing inference exposure in encrypted databases, ACM TISSEC 8(1) (2005), 119-152.
-
(2005)
Modeling and Assessing Inference Exposure in Encrypted Databases
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
Vimercati Di, C.S.D.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
5
-
-
0003160114
-
-
El Paso, TX, USA, May 1997
-
B. Chor and N. Gilboa, Computationally private information retrieval (extended abstract), in: Proc. of STOC 1997, El Paso, TX, USA, May 1997.
-
(1997)
Computationally Private Information Retrieval (Extended Abstract), In: Proc. of STOC
-
-
Chor, B.1
Gilboa, N.2
-
6
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich and M. Sudan, Private information retrieval, JACM 45(6) (1998), 965-981.
-
(1998)
JACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
60649105959
-
-
Anaheim, CA, USA, December 2008
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi and F. Scotti, Privacy-aware biometrics: Design and implementation of a multimodal verification system, in: Proc. of ACSAC 2008, Anaheim, CA, USA, December 2008.
-
(2008)
Privacy-aware Biometrics: Design and Implementation of A Multimodal Verification System, In: Proc. of ACSAC
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
8
-
-
18744366643
-
-
Washington, DC, USA, October 2003
-
E. Damiani, S. De Capitani Vimercati, S. Jajodia, S. Paraboschi and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, in: Proc. of CCS 2003, Washington, DC, USA, October 2003.
-
(2003)
Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs, In: Proc. of CCS
-
-
Damiani, E.1
Vimercati Capitani, S.D.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
80051865953
-
Efficient and private access to outsourced data
-
MN, USA, June
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi and P. Samarati, Efficient and private access to outsourced data, in: Proc. of ICDCS 2011, Minneapolis, MN, USA, June 2011.
-
(2011)
Proc. Of ICDCS 2011, Minneapolis
-
-
Vimercati, D.C.S.D.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
10
-
-
80053026532
-
Supporting concurrency in private data outsourcing
-
Leuven, Belgium, September
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi and P. Samarati, Supporting concurrency in private data outsourcing, in: Proc. of ESORICS 2011, Leuven, Belgium, September 2011.
-
(2011)
Proc. Of ESORICS 2011
-
-
Vimercati Di Capitani, S.D.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
11
-
-
84872068962
-
Managing and Accessing Data in the Cloud: Privacy Risks and Approaches
-
Ireland, October 2012
-
S. De Capitani di Vimercati, S. Foresti and P. Samarati, Managing and accessing data in the cloud: Privacy risks and approaches, in: Proc. of CRiSIS 2012, Cork, Ireland, October 2012.
-
Proc. Of CRiSIS 2012, Cork
-
-
Vimercati Di Capitani, S.D.1
Foresti, S.2
Samarati, P.3
-
12
-
-
84872291246
-
Efficient techniques for privacy-preserving sharing of sensitive information
-
Pittsburgh, PA, USA, June 2011
-
E. De Cristofaro, Y. Lu and G. Tsudik, Efficient techniques for privacy-preserving sharing of sensitive information, in: Proc. of TRUST 2011, Pittsburgh, PA, USA, June 2011.
-
Proc. Of TRUST 2011
-
-
De Cristofaro, E.1
Lu, Y.2
Tsudik, G.3
-
13
-
-
79951822560
-
Database access pattern protection without full-shuffles
-
X. Ding, Y. Yang and R.H. Deng, Database access pattern protection without full-shuffles, IEEE TIFS 6(1) (2011), 189-201.
-
(2011)
IEEE TIFS 6
, vol.1
, pp. 189-201
-
-
Ding, X.1
Yang, Y.2
Deng, R.H.3
-
14
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy, May 2005
-
M. Gamassi, V. Piuri, D. Sana and F. Scotti, Robust fingerprint detection for access control, in: Proc. of RoboCare 2005, Rome, Italy, May 2005.
-
(2005)
Proc. Of RoboCare
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
15
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, JACM 43(3) (1996), 431-473. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
16
-
-
0036204131
-
Providing database as a service
-
H. Hacigümüs, B. Iyer and S. Mehrotra, Providing database as a service, in: Proc. of ICDE 2002, San Jose, CA, USA, February 2002.
-
(2002)
Proc. Of ICDE, San Jose, CA, USA, February 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
17
-
-
0036361105
-
-
Madison, WI, USA, June 2002
-
H. Hacigümüs, B. Iyer, S. Mehrotra and C. Li, Executing SQL over encrypted data in the databaseservice- provider model, in: Proc. of SIGMOD 2002, Madison, WI, USA, June 2002.
-
(2002)
Executing SQL over Encrypted Data in the Databaseservice- Provider Model, In: Proc. of SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
18
-
-
34548139114
-
-
Prentice-Hall, Inc., Upper Saddle River, NJ, USA
-
E.D. Lazowska, J. Zahorjan, G.S. Graham and K.C. Sevcik, Quantitative System Performance: Computer System Analysis Using Queueing Network Models, Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1984.
-
(1984)
Computer System Analysis Using Queueing Network Models
-
-
Lazowska, E.D.1
Zahorjan, J.2
Graham, G.S.3
Sevcik, K.C.4
-
19
-
-
33646382224
-
-
Porto, Portugal, April 2004
-
P. Lin and K.S. Candan, Hiding traversal of tree structured data from untrusted data stores, in: Proc. of WOSIS 2004, Porto, Portugal, April 2004.
-
(2004)
Hiding Traversal of Tree Structured Data from Untrusted Data Stores, In: Proc. of WOSIS
-
-
Lin, P.1
Candan, K.S.2
-
20
-
-
84991002123
-
-
Toronto, Canada, August 2004
-
P. Lin and K.S. Candan, Secure and privacy preserving outsourcing of tree structured data, in: Proc. of SDM 2004, Toronto, Canada, August 2004.
-
(2004)
Secure and Privacy Preserving Outsourcing of Tree Structured Data, In: Proc. of SDM
-
-
Lin, P.1
Candan, K.S.2
-
21
-
-
84865629030
-
Privacy-preserving cloud database querying
-
Y. Lu and G. Tsudik, Privacy-preserving cloud database querying, JISIS 1(4) (2011), 5-25.
-
JISIS 1
, vol.4
, Issue.2011
, pp. 5-25
-
-
Lu, Y.1
Tsudik, G.2
-
22
-
-
80755127495
-
Privacy-preserving queries over relational databases
-
Berlin, Germany, July
-
F. Olumofin and I. Goldberg, Privacy-preserving queries over relational databases, in: Proc. of PETS 2010, Berlin, Germany, July 2010.
-
(2010)
Proc. Of PETS 2010
-
-
Olumofin, F.1
Goldberg, I.2
-
23
-
-
77954461010
-
-
Proc. of ASIACCS 2010, Beijing, China, April 2010
-
P. Samarati and S. De Capitani di Vimercati, Data protection in outsourcing scenarios: Issues and directions, in: Proc. of ASIACCS 2010, Beijing, China, April 2010.
-
Di Vimercati Data Protection in Outsourcing Scenarios: Issues and Directions
-
-
Samarati, P.1
De Capitani, S.2
-
24
-
-
84881394580
-
-
Storrs, CT, USA, August 2005
-
E. Shmueli, R. Waisenberg, Y. Elovici and E. Gudes, Designing secure indexes for encrypted databases, in: Proc. of IFIP DBSec 2005, Storrs, CT, USA, August 2005.
-
(2005)
Designing Secure Indexes for Encrypted Databases, In: Proc. of IFIP DBSec
-
-
Shmueli, E.1
Waisenberg, R.2
Elovici, Y.3
Gudes, E.4
-
25
-
-
85141026002
-
-
San Diego, CA, USA, February/March 2007
-
R. Sion and B. Carbunar, On the computational practicality of private information retrieval, in: Proc. of NDSS 2007, San Diego, CA, USA, February/March 2007.
-
(2007)
On the Computational Practicality of Private Information Retrieval, In: Proc. of NDSS
-
-
Sion, R.1
Carbunar, B.2
-
26
-
-
77749250556
-
-
Seoul, Korea, September 2006
-
H.Wang and L.V.S. Lakshmanan, Efficient secure query evaluation over encrypted XML databases, in: Proc. of VLDB 2006, Seoul, Korea, September 2006.
-
(2006)
Efficient Secure Query Evaluation over Encrypted XML Databases, In: Proc. of VLDB
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
27
-
-
84881467253
-
A comprehensive framework for secure query processing on relational data in the cloud
-
Seattle, WA, USA, September 2011
-
S. Wang, D. Agrawal and A. El Abbadi, A comprehensive framework for secure query processing on relational data in the cloud, in: Proc. of SDM 2011, Seattle, WA, USA, September 2011.
-
Proc. Of SDM 2011
-
-
Wang, S.1
Agrawal, D.2
El Abbadi, A.3
-
28
-
-
70349278621
-
-
Alexandria, VA, USA, October 2008
-
P. Williams, R. Sion and B. Carbunar, Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage, in: Proc of CCS 2008, Alexandria, VA, USA, October 2008.
-
(2008)
Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage, In: Proc of CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
29
-
-
80053019963
-
-
Proc. of ESORICS 2011, Leuven, Belgium, September 2011
-
K. Yang, J. Zhang, W. Zhang and D. Qiao, A light-weight solution to preservation of access pattern privacy in un-trusted clouds, in: Proc. of ESORICS 2011, Leuven, Belgium, September 2011.
-
Light-weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
-
-
Yang, K.1
Zhang, J.2
Zhang, W.3
Qiao A, D.4
|