-
1
-
-
84894906470
-
-
Advances in cryptology - crypto 2007 Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, CRYPTO Lecture Notes in Computer Science, Springer
-
Advances in cryptology - crypto 2007, in: A. Menezes, (Ed.), 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, CRYPTO, Volume 4622 of Lecture Notes in Computer Science, Springer, 2007.
-
(2007)
27th Annual International Cryptology Conference
, vol.4622
-
-
Menezes, A.1
-
2
-
-
85136049562
-
Enabling privacy for the paranoids
-
August 2004
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, N. Mishra, R. Motwani, U. Srivastava, D. Thomas, J. Widom, Y. Xu, Enabling privacy for the paranoids, in: Proc. of the 30th Int'l Conference on Very Large Databases VLDB, August 2004, pp. 708-719.
-
Proc. of the 30th Int'l Conference on Very Large Databases VLDB
, pp. 708-719
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Mishra, N.6
Motwani, R.7
Srivastava, U.8
Thomas, D.9
Widom, J.10
Xu, Y.11
-
3
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu, Two can keep a secret: a distributed architecture for secure database services, in: CIDR, 2005, pp. 186-199.
-
(2005)
CIDR
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
4
-
-
35048875418
-
Privacy-preserving computation of the k'th-ranked element
-
G. Aggarwal, N. Mishra, B. Pinkas, Privacy-preserving computation of the k'th-ranked element, in: Proc. of IACR Eurocrypt, 2004, pp. 40-55.
-
(2004)
Proc. of IACR Eurocrypt
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
5
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proc. of the 2003 ACM SIGMOD International Conference on Management of Data, 2003, pp. 86-97.
-
(2003)
Proc. of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
7
-
-
0242674432
-
Hippocratic databases
-
Hong Kong, August 2002
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Hippocratic databases, in: 28th Int'l Conf. on Very Large Databases (VLDB), Hong Kong, August 2002.
-
28th Int'l Conf. on Very Large Databases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
0344927756
-
Implementing p3p using database technology
-
India, March 2003
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Implementing p3p using database technology, in: Proc. of the 19th Int'l Conference on Data Engineering, Bangalore, India, March 2003.
-
Proc. of the 19th Int'l Conference on Data Engineering, Bangalore
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
9
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM Press New York, NY, USA
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu Order preserving encryption for numeric data SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data 2004 ACM Press New York, NY, USA 563 574
-
(2004)
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
11
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
S. Agrawal, J.R. Haritsa, A framework for high-accuracy privacy-preserving mining, in: ICDE, 2005, pp. 193-204.
-
(2005)
ICDE
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
12
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B.C. Ooi, Y. Yang, R.H. Deng, Privacy and ownership preserving of outsourced medical data, in: ICDE, 2005.
-
(2005)
ICDE
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
13
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler Computationally private information retrieval with polylogarithmic communication Lecture Notes in Computer Science 1592 1999 402 414
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
15
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.Y. Zhu Tools for privacy preserving distributed data mining SIGKDD Exploration Newsletter 4 2 2002 28 34
-
(2002)
SIGKDD Exploration Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
17
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekci, D. Agrawal, A.E. Abbadi, A. Gulbeden, Privacy preserving query processing using third parties, in: ICDE, 2006.
-
(2006)
ICDE
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
19
-
-
84864113565
-
Distributing data for secure database services
-
V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani Distributing data for secure database services Transactions on Data Privacy 5 1 2012 253 272
-
(2012)
Transactions on Data Privacy
, vol.5
, Issue.1
, pp. 253-272
-
-
Ganapathy, V.1
Thomas, D.2
Feder, T.3
Garcia-Molina, H.4
Motwani, R.5
-
20
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
H. Hacigumus, B.R. Iyer, C. Li, S. Mehrotra, Executing SQL over encrypted data in the database service provider model, in: SIGMOD Conference, 2002.
-
(2002)
SIGMOD Conference
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
21
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, G. Tsudik, A privacy-preserving index for range queries, in: Proc. of the 30th Int'l Conference on Very Large Databases VLDB, 2004, pp. 720-731.
-
(2004)
Proc. of the 30th Int'l Conference on Very Large Databases VLDB
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
22
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, G. Tsudik, A privacy-preserving index for range queries, in: VLDB, 2004, pp. 720-731.
-
(2004)
VLDB
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
24
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, W. Lou, Authorized private keyword search over encrypted data in cloud computing, in: ICDCS, 2011, pp. 383-392.
-
(2011)
ICDCS
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
26
-
-
33646389248
-
Autonomous distributed secret sharing storage system
-
T. Miyamoto, S. Doi, H. Nogawa, and S. Kumagai Autonomous distributed secret sharing storage system Systems and Computers in Japan 37 6 2006 55 63
-
(2006)
Systems and Computers in Japan
, vol.37
, Issue.6
, pp. 55-63
-
-
Miyamoto, T.1
Doi, S.2
Nogawa, H.3
Kumagai, S.4
-
27
-
-
84894901264
-
Recursive secret sharing for distributed storage and information hiding
-
A. Parakh, and S. Kak Recursive secret sharing for distributed storage and information hiding CoRR, abs/1001.3331 2010
-
(2010)
CoRR, abs/1001.3331
-
-
Parakh, A.1
Kak, S.2
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Communications of the ACM 22 11 1979 612 613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|