-
1
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
2
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965-981 (1998)
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
3
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
4
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC (October 2003)
-
Proc. of CCS 2003, Washington, DC (October 2003)
-
-
Damiani, E.1
De Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
80051865953
-
Efficient and private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011, Minneapolis, MN (June 2011)
-
Proc. of ICDCS 2011, Minneapolis, MN (June 2011)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
6
-
-
80053026532
-
Supporting concurrency in private data outsourcing
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency in private data outsourcing. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 648-664. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 648-664
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
7
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of CRiSIS 2012, Cork, Ireland (October 2012)
-
Proc. of CRiSIS 2012, Cork, Ireland (October 2012)
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
8
-
-
85192414446
-
Selective and fine-grained access to data in the cloud
-
Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.) Springer
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. Springer (2013)
-
(2013)
Secure Cloud Computing
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
9
-
-
79951822560
-
Database access pattern protection without fullshuffles
-
Ding, X., Yang, Y., Deng, R.: Database access pattern protection without fullshuffles. IEEE TIFS 6(1), 189-201 (2011)
-
(2011)
IEEE TIFS
, vol.6
, Issue.1
, pp. 189-201
-
-
Ding, X.1
Yang, Y.2
Deng, R.3
-
10
-
-
21144442219
-
A survey on private information retrieval
-
Gasarch, W.: A survey on private information retrieval. Bulletin of the EATCS 82, 72-107 (2004)
-
(2004)
Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
11
-
-
0030149547
-
Software protection and simulation on Oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on Oblivious RAMs. Journal of the ACM 43(3), 431-473 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
84885691264
-
Privacy-preserving group data access via stateless Oblivious RAM simulation
-
Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless Oblivious RAM simulation. In: Proc. of SODA 2012, Kyoto, Japan (January 2012)
-
Proc. of SODA 2012, Kyoto, Japan (January 2012)
-
-
Goodrich, M.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD 2002, Madison, WI (June 2002)
-
Proc. of SIGMOD 2002, Madison, WI (June 2002)
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
14
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. The VLDB Journal 21, 333-358 (2012)
-
(2012)
The VLDB Journal
, vol.21
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
16
-
-
84873955790
-
Distributed Oblivious RAM for secure two-party computation
-
Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
-
Lu, S., Ostrovsky, R.: Distributed Oblivious RAM for secure two-party computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 377-396. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 377-396
-
-
Lu, S.1
Ostrovsky, R.2
-
17
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. VLDBJ 19(4), 457-475 (2010)
-
(2010)
VLDBJ
, vol.19
, Issue.4
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
19
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23(8), 1467-1479 (2012)
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
22
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: Proc. of CCS 2008, Alexandria, VA (October 2008)
-
Proc. of CCS 2008, Alexandria, VA (October 2008)
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
23
-
-
80053005931
-
A light-weight solution to preservation of access pattern privacy in un-trusted clouds
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Yang, K., Zhang, J., Zhang, W., Qiao, D.: A light-weight solution to preservation of access pattern privacy in un-trusted clouds. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 528-547. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 528-547
-
-
Yang, K.1
Zhang, J.2
Zhang, W.3
Qiao, D.4
|