-
1
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order Preserving Encryption for Numeric Data, Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD), 2004.
-
(2004)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Univ. of Berkerley
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.K. Andy Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, technical report, Univ. of Berkerley, 2009.
-
(2009)
Technical Report
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Andy Konwinski, R.K.5
Lee, G.6
Patterson, D.7
Rabkin, A.8
Stoica, I.9
Zaharia, M.10
-
3
-
-
79957620464
-
Security modeling and analysis
-
May/June
-
J. Bau and J.C. Mitchell, Security Modeling and Analysis, IEEE Security and Privacy, vol. 9, no. 3, pp. 18-25, May/June 2011.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 18-25
-
-
Bau, J.1
Mitchell, J.C.2
-
5
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud Data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, Proc. IEEE INFOCOMM, 2011.
-
(2011)
Proc. IEEE INFOCOMM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
6
-
-
79952779059
-
Rasp: Efficient multidimensional range query on attack-resilient encrypted databases
-
K. Chen, R. Kavuluru, and S. Guo, RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases, Proc. ACM Conf. Data and Application Security and Privacy, pp. 249-260, 2011.
-
(2011)
Proc. ACM Conf. Data and Application Security and Privacy
, pp. 249-260
-
-
Chen, K.1
Kavuluru, R.2
Guo, S.3
-
7
-
-
81155123637
-
Geometric data perturbation for outsourced data mining
-
K. Chen and L. Liu, Geometric Data Perturbation for Outsourced Data Mining, Knowledge and Information Systems, vol. 29, pp. 657-695, 2011.
-
(2011)
Knowledge and Information Systems
, vol.29
, pp. 657-695
-
-
Chen, K.1
Liu, L.2
-
9
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private Information Retrieval, ACM Computer Survey, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
ACM Computer Survey
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions, Proc. 13th ACM Conf. Computer and Comm. Security, pp. 79-88, 2006. (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over Encrypted Data in the Database-Service-Provider Model, Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD), 2002.
-
(2002)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD)
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
18
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Dynamic Authenticated Index Structures for Outsourced Databases, Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD), 2006.
-
(2006)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD)
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
20
-
-
77953139328
-
Enabling search services on outsourced private spatial data
-
M.L. Liu, G. Ghinita, C.S. Jensen, and P. Kalnis, Enabling Search Services on Outsourced Private Spatial Data, The Int'l J. Very Large Data Base, vol. 19, no. 3, pp. 363-384, 2010.
-
(2010)
The Int'l J. Very Large Data Base
, vol.19
, Issue.3
, pp. 363-384
-
-
Liu, M.L.1
Ghinita, G.2
Jensen, C.S.3
Kalnis, P.4
-
22
-
-
77958396896
-
Nearest neighbour searches and the curse of dimensionality
-
R. Marimont and M. Shapiro, Nearest Neighbour Searches and the Curse of Dimensionality, J. Inst. of Math. and Its Applications, vol. 24, pp. 59-70, 1979.
-
(1979)
J. Inst. of Math. and Its Applications
, vol.24
, pp. 59-70
-
-
Marimont, R.1
Shapiro, M.2
-
23
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M.F. Mokbel, C. yin Chow, and W.G. Aref, The New Casper: Query Processing for Location Services without Compromising Privacy, Proc. 32nd Int'l Conf. Very Large Databases Conf. (VLDB), pp. 763-774, 2006.
-
(2006)
Proc. 32nd Int'l Conf. Very Large Databases Conf. (VLDB)
, pp. 763-774
-
-
Mokbel, M.F.1
Yin Chow, C.2
Aref, W.G.3
-
27
-
-
76749128899
-
Smallest singular value of a random rectangular matrix
-
M. Rudelson and R. Vershynin, Smallest Singular Value of a random Rectangular Matrix, Comm. Pure and Applied Math., vol. 62, pp. 1707-1739, 2009.
-
(2009)
Comm. Pure and Applied Math.
, vol.62
, pp. 1707-1739
-
-
Rudelson, M.1
Vershynin, R.2
-
28
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H.H. Chan, D. Song, and A. Perrig, Multi-Dimensional Range Query over Encrypted Data, Proc. IEEE Symp. Security and Privacy, 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
30
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure Ranked Keyword Search over Encrypted Cloud Data, Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2010.
-
(2010)
Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS)
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
32
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. K, D.W.-l. Cheung, B. Kao, and N. Mamoulis, Secure KNN Computation on Encrypted Databases, Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD), pp. 139-152, 2009.
-
(2009)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD)
, pp. 139-152
-
-
Cheung, W.K.K.D.W.-L.1
Kao, B.2
Mamoulis, N.3
-
33
-
-
84997556980
-
Integrity auditing of outsourced data
-
M. Xie, H. Wang, J. Yin, and X. Meng, Integrity Auditing of Outsourced Data, Proc. Very Large Databases Conf. (VLDB), pp. 782-793, 2007.
-
(2007)
Proc. Very Large Databases Conf. (VLDB)
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
34
-
-
84891785989
-
Building confidential and efficient query services in the cloud with rasp data perturbation
-
H. Xu, S. Guo, and K. Chen, Building Confidential and Efficient Query Services in the Cloud with Rasp Data Perturbation, Wright State Technical Report, http://arxiv.org/abs/1212.0610, 2012.
-
(2012)
Wright State Technical Report
-
-
Xu, H.1
Guo, S.2
Chen, K.3
-
35
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M.L. L, C.S. S, X. Huang, and H. Lu, SpaceTwist: Managing the Trade-Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services, Proc. IEEE Int'l Conf. Data Eng. (ICDE), pp. 366-375, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 366-375
-
-
Huang, X.1
Lu, H.2
|