-
1
-
-
0030577321
-
New privacy homomorphism and applications
-
1435849
-
Domingo-Ferrer, J., New privacy homomorphism and applications. Inf. Process. Lett. 5(60):277-282, 1994.
-
(1994)
Inf. Process. Lett.
, vol.5
, Issue.60
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
3
-
-
69949110664
-
Silog: Speech input logon
-
10.1016/j.knosys.2008.10.002
-
Grau, S., Allen, T., and Sherkat, N., Silog: Speech input logon. Knowl.-Based Syst. 7(22):535-539, 2009.
-
(2009)
Knowl.-Based Syst.
, vol.7
, Issue.22
, pp. 535-539
-
-
Grau, S.1
Allen, T.2
Sherkat, N.3
-
4
-
-
0036361105
-
Executing sql over encrypted data in the database service provider model
-
Hakan, H., Bala, L., and Chen, L., Executing sql over encrypted data in the database service provider model. In: Proceedings of SIGMOD' 02, pp. 216-227, 2002.
-
(2002)
Proceedings of SIGMOD' 02
, pp. 216-227
-
-
Hakan, H.1
Bala, L.2
Chen, L.3
-
5
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Balakrishnan, H, CryptDB: Protecting confidentiality with encrypted query processing. In: Proceedings of SOSP' 11, pp. 85-100, 2011.
-
(2011)
Proceedings of SOSP' 11
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
6
-
-
84866500725
-
Executing sql queries over encrypted character strings in the database-as-service model
-
10.1016/j.knosys.2012.05.009
-
Wu, Z., Xu, G., Zong, Y., Yi, X., Chen, E., and Zhang, Z., Executing sql queries over encrypted character strings in the database-as-service model. Knowl.-Based Syst. 12(35):332-348, 2012.
-
(2012)
Knowl.-Based Syst.
, vol.12
, Issue.35
, pp. 332-348
-
-
Wu, Z.1
Xu, G.2
Zong, Y.3
Yi, X.4
Chen, E.5
Zhang, Z.6
-
7
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 3(36):1989-1995, 2012.
-
(2012)
J. Med. Syst.
, vol.3
, Issue.36
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
8
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 1(46):28-30, 2012.
-
(2012)
IEEE Trans. Consum. Electron.
, vol.1
, Issue.46
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
9
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
10.1049/el:20020380
-
Lee, J. K., Ryu, S. R., and Yoo, K. Y., Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 12(38):554-555, 2002.
-
(2002)
Electron. Lett.
, vol.12
, Issue.38
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
10
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
10.1007/s10916-013-9941-8
-
Lee, T. F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 3(37):9941-9948, 2013.
-
(2013)
J. Med. Syst.
, vol.3
, Issue.37
, pp. 9941-9948
-
-
Lee, T.F.1
Liu, C.M.2
-
11
-
-
79959762596
-
Secure smart card based password authentication scheme with user anonymity
-
Li, C. T., Secure smart card based password authentication scheme with user anonymity. Inform. Technol. Control. 2(40):157-162, 2011.
-
(2011)
Inform. Technol. Control.
, vol.2
, Issue.40
, pp. 157-162
-
-
Li, C.T.1
-
12
-
-
72749119292
-
Providing privacy through plausibly deniable search
-
Murugesan, M., and Clifton, C., Providing privacy through plausibly deniable search. In: Proceedings of SIAM' 09, pp. 768-780, 2009.
-
(2009)
Proceedings of SIAM' 09
, pp. 768-780
-
-
Murugesan, M.1
Clifton, C.2
-
13
-
-
33746327374
-
-
Academic Press New York
-
Rivest, R., Adleman, L., and Dertouzos, M. L., On data banks and privacy homomorphism: Foundation of secure computation. New York: Academic Press, 1978.
-
(1978)
On Data Banks and Privacy Homomorphism: Foundation of Secure Computation
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.L.3
-
14
-
-
0028513932
-
Access control: Principles and practice
-
10.1109/35.312842
-
Sandhu, R. S., and Samarati, P., Access control: Principles and practice. IEEE Commun. Mag. 9(32): 40-48, 1994.
-
(1994)
IEEE Commun. Mag.
, vol.9
, Issue.32
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
15
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
10.1007/s10916-012-9835-1
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 6(36):3597-3604, 2012.
-
(2012)
J. Med. Syst.
, vol.6
, Issue.36
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
16
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
10.1007/s10916-010-9614-9
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 3(36):1529-1535, 2012.
-
(2012)
J. Med. Syst.
, vol.3
, Issue.36
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
17
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
10.1007/s10916-012-9856-9
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 6(36): 3833-3841, 2012.
-
(2012)
J. Med. Syst.
, vol.6
, Issue.36
, pp. 3833-3841
-
-
Zhu, Z.1
|