-
5
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: Proc. of ACM Management of Data (SIGMOD). (2002) 216-227
-
(2002)
Proc. of ACM Management of Data (SIGMOD).
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
7
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. of ACM Management of Data (SIGMOD). (2004) 551-562
-
(2004)
Proc. of ACM Management of Data (SIGMOD).
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
8
-
-
33646373081
-
Chip-secured data access: Reconciling access rights with data encryption
-
Bouganim, L., Ngoc, F.D., Pucheral, P., Wu, L.: Chip-secured data access: Reconciling access rights with data encryption. In: Proc. of Very Large Data Bases (VLDB). (2003) 1133-1136
-
(2003)
Proc. of Very Large Data Bases (VLDB).
, pp. 1133-1136
-
-
Bouganim, L.1
Ngoc, F.D.2
Pucheral, P.3
Wu, L.4
-
9
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of relational query results in data publishing. In: Proc. of ACM Management of Data (SIGMOD). (2005) 407-418
-
(2005)
Proc. of ACM Management of Data (SIGMOD).
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.L.4
-
10
-
-
33745601730
-
Query execution assurance for outsourced databases
-
Sion, R.: Query execution assurance for outsourced databases. In: Proc. of Very Large Data Bases (VLDB). (2005) 601-612
-
(2005)
Proc. of Very Large Data Bases (VLDB).
, pp. 601-612
-
-
Sion, R.1
-
11
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: ISC. (2001) 379-393
-
(2001)
ISC.
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.2
Tamassia, R.3
-
12
-
-
35248831605
-
Authenticated data structures for graph and geometric searching
-
Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: CT-RSA. (2003) 295-313
-
(2003)
CT-RSA.
, pp. 295-313
-
-
Goodrich, M.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
13
-
-
26444561838
-
Computational bounds on hierarchical data processing with applications to information security
-
Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: ICALP. (2005) 153-165
-
(2005)
ICALP.
, pp. 153-165
-
-
Tamassia, R.1
Triandopoulos, N.2
-
14
-
-
85011031975
-
Proof-infused streams: Enabling authentication of sliding window queries on streams
-
Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: Enabling authentication of sliding window queries on streams. In: Proc. of Very Large Data Bases (VLDB). (2007)
-
(2007)
Proc. of Very Large Data Bases (VLDB).
-
-
Li, F.1
Yi, K.2
Hadjieleftheriou, M.3
Kollios, G.4
-
17
-
-
0009504774
-
-
National Institute of Standards and Technology National Institute of Standards and Technology
-
National Institute of Standards and Technology: FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)
-
(1995)
FIPS PUB 180-1: Secure Hash Standard
-
-
-
18
-
-
33646754186
-
Finding collisions in the full sha-1
-
Wang, X., Yin, Y., Yu, H.: Finding collisions in the full sha-1. In: CRYPTO. (2005)
-
(2005)
CRYPTO.
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
-
20
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2) (1988) 96-99
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 96-99
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (CACM) 21(2) (1978) 120-126
-
(1978)
Communications of the ACM (CACM)
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
28
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A general model for authenticated data structures. Algorithmica 39(1) (2004) 21-41
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
29
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of ACM Management of Data (SIGMOD). (2006)
-
(2006)
Proc. of ACM Management of Data (SIGMOD).
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
30
-
-
0018480749
-
The ubiquitous B-tree
-
Comer, D.: The ubiquitous B-tree. ACM Computing Surveys 11(2) (1979) 121-137
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
31
-
-
52649097332
-
Authenticating multi-dimensional query results in data publishing
-
Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: DBSec. (2006)
-
(2006)
DBSec.
-
-
Cheng, W.1
Pang, H.2
Tan, K.3
-
32
-
-
26444554946
-
Verified query results from hybrid authentication trees
-
Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec. (2005) 84-98
-
(2005)
DBSec.
, pp. 84-98
-
-
Nuckolls, G.1
-
34
-
-
33745528450
-
Authentication of outsourced databases using signature aggregation and chaining
-
Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: DASFAA. (2006) 420-436
-
(2006)
DASFAA.
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
35
-
-
0040746902
-
Progressive approximate aggregate queries with a multi-resolution tree structure
-
Lazaridis, I., Mehrotra, S.: Progressive approximate aggregate queries with a multi-resolution tree structure. In: Proc. of ACM Management of Data (SIGMOD). (2001) 401-412
-
(2001)
Proc. of ACM Management of Data (SIGMOD).
, pp. 401-412
-
-
Lazaridis, I.1
Mehrotra, S.2
-
37
-
-
78651381967
-
-
Technical report, CS Dept., Boston University
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index sturctures for aggregation queries in outsourced databases. Technical report, CS Dept., Boston University (2006)
-
(2006)
Authenticated Index Sturctures for Aggregation Queries in Outsourced Databases
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
|