-
1
-
-
84881291652
-
-
Technical Report TR-ECE-12-11, School of Electrical and Computer Engineering, Purdue University, URL
-
F. Ahmad, S. Lee, M. Thottethodi, and T. Vijaykumar. Puma: Purdue mapreduce benchmarks suite. Technical Report TR-ECE-12-11, School of Electrical and Computer Engineering, Purdue University, 2012. URL http://docs.lib.purdue. edu/ecetr/437/.
-
(2012)
Puma: Purdue Mapreduce Benchmarks Suite
-
-
Ahmad, F.1
Lee, S.2
Thottethodi, M.3
Vijaykumar, T.4
-
2
-
-
84974622621
-
Extended notions of security for multicast public key cryptosystems
-
Springer
-
O. Baudron, D. Pointcheval, and J. Stern. Extended notions of security for multicast public key cryptosystems. In ICALP'00, volume 1853 of Lecture Notes in Computer Science, pages 499-511. Springer, 2000.
-
(2000)
ICALP'00, Volume 1853 of Lecture Notes in Computer Science
, pp. 499-511
-
-
Baudron, O.1
Pointcheval, D.2
Stern, J.3
-
3
-
-
0037673373
-
Authenticated encryption in ssh: Provably fixing the ssh binary packet protocol
-
ACM
-
M. Bellare, T. Kohno, and C. Namprempre. Authenticated encryption in ssh: provably fixing the ssh binary packet protocol. In CCS'02, pages 1-11. ACM, 2002.
-
(2002)
CCS'02
, pp. 1-11
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
4
-
-
70549111101
-
Formatpreserving encryption
-
Springer
-
M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Formatpreserving encryption. In Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, pages 295-312. Springer, 2009.
-
(2009)
Selected Areas in Cryptography, Volume 5867 of Lecture Notes in Computer Science
, pp. 295-312
-
-
Bellare, M.1
Ristenpart, T.2
Rogaway, P.3
Stegers, T.4
-
5
-
-
67650690965
-
Orderpreserving symmetric encryption
-
Springer
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Orderpreserving symmetric encryption. In EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, pages 224-241. Springer, 2009.
-
(2009)
EUROCRYPT, Volume 5479 of Lecture Notes in Computer Science
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
6
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
Springer
-
A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 578-595. Springer, 2011.
-
(2011)
CRYPTO, Volume 6841 of Lecture Notes in Computer Science
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
7
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
MOBIQUITOUS'05, Washington, DC, USA, 2005. IEEE Computer Society
-
C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS'05, pages 109-117, Washington, DC, USA, 2005. IEEE Computer Society.
-
Proceedings of the the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
9
-
-
73649114265
-
MapReduce: A flexible data processing tool
-
J. Dean and S. Ghemawat. MapReduce: a flexible data processing tool. Commun. ACM, 53(1):72-77, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.1
, pp. 72-77
-
-
Dean, J.1
Ghemawat, S.2
-
10
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
11
-
-
33845512960
-
Flowinsensitive type qualifiers
-
November
-
J. S. Foster, R. Johnson, J. Kodumal, and A. Aiken. Flowinsensitive type qualifiers. ACM Trans. Program. Lang. Syst., 28(6):1035-1087, November 2006.
-
(2006)
ACM Trans. Program. Lang. Syst.
, vol.28
, Issue.6
, pp. 1035-1087
-
-
Foster, J.S.1
Johnson, R.2
Kodumal, J.3
Aiken, A.4
-
12
-
-
80755168343
-
Information-flow types for homomorphic encryptions
-
CCS'11, ACM
-
C. Fournet, J. Planul, and T. Rezk. Information-flow types for homomorphic encryptions. In Proceedings of the 18th ACM conference on Computer and communications security, CCS'11, pages 351-360. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 351-360
-
-
Fournet, C.1
Planul, J.2
Rezk, T.3
-
15
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
19
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
Berlin, Heidelberg, Springer-Verlag
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In Proceedings of the 19th international conference on Theory and application of cryptographic techniques, EUROCRYPT'00, pages 539-556, Berlin, Heidelberg, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'00
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
22
-
-
77952379905
-
Secure untrusted data repository (sundr)
-
ACM
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (sundr). In OSDI 04: Operating Systems Design and Implementation, pages 91-106. ACM, 2004.
-
(2004)
OSDI 04: Operating Systems Design and Implementation
, pp. 91-106
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
23
-
-
79955969463
-
Depot: Cloud storage with minimal trust
-
ACM
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In OSDI 10: Operating Systems Design and Implementation. ACM, 2010.
-
(2010)
OSDI 10: Operating Systems Design and Implementation
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
24
-
-
84866925734
-
Information-flow control for programming on encrypted data
-
IEEE
-
J. C. Mitchell, R. Sharma, D. Stefan, and J. Zimmerman. Information-flow control for programming on encrypted data. In Computer Security Foundations Symposium (CSF), 2012 IEEE 25th, pages 45-60. IEEE, 2012.
-
(2012)
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
, pp. 45-60
-
-
Mitchell, J.C.1
Sharma, R.2
Stefan, D.3
Zimmerman, J.4
-
25
-
-
80955157888
-
Can homomorphic encryption be practical?
-
New York, NY, USA, ACM
-
M. Naehrig, K. Lauter, and V. Vaikuntanathan. Can homomorphic encryption be practical? In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW'11, pages 113-124, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
26
-
-
35248882492
-
Polyglot: An extensible compiler framework for java
-
Springer
-
N. Nystrom, M. Clarkson, and A. Myers. Polyglot: An extensible compiler framework for java. In Compiler Construction, pages 138-152. Springer, 2003.
-
(2003)
Compiler Construction
, pp. 138-152
-
-
Nystrom, N.1
Clarkson, M.2
Myers, A.3
-
27
-
-
55349148888
-
Pig latin: A not-so-foreign language for data processing
-
New York, NY, USA, ACM
-
C. Olston, B. Reed, U. Srivastava, R. Kumar, and A. Tomkins. Pig latin: a not-so-foreign language for data processing. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD'08, pages 1099-1110, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD'08
, pp. 1099-1110
-
-
Olston, C.1
Reed, B.2
Srivastava, U.3
Kumar, R.4
Tomkins, A.5
-
30
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
Washington, DC, USA, IEEE Computer Society
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. CLAMP: Practical prevention of large-scale data leaks. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP'09, pages 154-169, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP'09
, pp. 154-169
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
31
-
-
70350512695
-
A comparison of approaches to large-scale data analysis
-
ACM
-
A. Pavlo, E. Paulson, A. Rasin, D. J. Abadi, D. J. DeWitt, S. Madden, and M. Stonebraker. A comparison of approaches to large-scale data analysis. In Proceedings of the 35th SIG-MOD international conference on Management of data, pages 165-178. ACM, 2009.
-
(2009)
Proceedings of the 35th SIG-MOD International Conference on Management of Data
, pp. 165-178
-
-
Pavlo, A.1
Paulson, E.2
Rasin, A.3
Abadi, D.J.4
De Witt, D.J.5
Madden, S.6
Stonebraker, M.7
-
32
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
ACM
-
R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 85-100. ACM, 2011.
-
(2011)
Proceedings of the Twenty-third ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.2
Zeldovich, N.3
Balakrishnan, H.4
-
33
-
-
74049149270
-
Secure anonymous database search
-
ACM
-
M. Raykova, B. Vo, S. M. Bellovin, and T. Malkin. Secure anonymous database search. In CCSW 09: Cloud Computing Security Workshop, pages 115-126. ACM, 2009.
-
(2009)
CCSW 09: Cloud Computing Security Workshop
, pp. 115-126
-
-
Raykova, M.1
Vo, B.2
Bellovin, S.M.3
Malkin, T.4
-
35
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
USENIX
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In NSDI, pages 297-312. USENIX, 2010.
-
(2010)
NSDI
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
38
-
-
84869436864
-
Policy-sealed data: A new abstraction for building trusted cloud services
-
USENIX Association
-
N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu. Policy-sealed data: A new abstraction for building trusted cloud services. In Usenix Security Symposium. USENIX Association, 2012.
-
(2012)
Usenix Security Symposium
-
-
Santos, N.1
Rodrigues, R.2
Gummadi, K.P.3
Saroiu, S.4
-
39
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
Springer
-
B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, pages 191-204. Springer, 1994.
-
(1994)
Fast Software Encryption
, pp. 191-204
-
-
Schneier, B.1
-
41
-
-
79952136840
-
Auraconf: A unified approach to authorization and confidentiality
-
New York, NY, USA, ACM
-
J. A. Vaughan. Auraconf: a unified approach to authorization and confidentiality. In Proceedings of the 7th ACM SIGPLAN workshop on Types in language design and implementation, TLDI'11, pages 45-58, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 7th ACM SIGPLAN Workshop on Types in Language Design and Implementation, TLDI'11
, pp. 45-58
-
-
Vaughan, J.A.1
-
43
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE
-
A. Yao. How to generate and exchange secrets. In FOCS 86: Foundations of Computer Science, pages 162-167. IEEE, 1986.
-
(1986)
FOCS 86: Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.1
|