-
1
-
-
84910678872
-
-
http://www.ciphercloud.com/.
-
-
-
-
2
-
-
84910628976
-
-
http://www.vaultive.com/.
-
-
-
-
3
-
-
84910648808
-
-
https://www.cs.cmu.edu/~enron/enron-mail-20110402.tgz.
-
-
-
-
5
-
-
67649635197
-
Database management as a service: Challenges and opportunities
-
D. Agrawal, A. El Abbadi, F. Emekçi, and A. Metwally. Database management as a service: challenges and opportunities. In Proceedings of the 25th International Conference on Data Engineering, ICDE, 2009.
-
(2009)
Proceedings of the 25th International Conference on Data Engineering, ICDE
-
-
Agrawal, D.1
El Abbadi, A.2
Emekçi, F.3
Metwally, A.4
-
6
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proceedings of the ACM International Conference on Management of Data, SIGMOD, 2004.
-
(2004)
Proceedings of the ACM International Conference on Management of Data, SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
67650690965
-
Order-preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Proceedings of the 28th International Conference on Advances in Cryptology, EUROCRYPT, 2009.
-
(2009)
Proceedings of the 28th International Conference on Advances in Cryptology, EUROCRYPT
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'neill, A.4
-
11
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Proceedings of the 33rd International Conference on Advances in Cryptology, CRYPTO, 2013.
-
(2013)
Proceedings of the 33rd International Conference on Advances in Cryptology, CRYPTO
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
12
-
-
84876789789
-
The SAP HANA database-an architecture overview
-
F. Färber, N. May, W. Lehner, P. Große, I. Müller, H. Rauhe, and J. Dees. The SAP HANA database-an architecture overview. IEEE Data Engineering Bulletin, 35(1):28-33, 2012.
-
(2012)
IEEE Data Engineering Bulletin
, vol.35
, Issue.1
, pp. 28-33
-
-
Färber, F.1
May, N.2
Lehner, W.3
Große, P.4
Müller, I.5
Rauhe, H.6
Dees, J.7
-
14
-
-
84879821906
-
Reusable garbled circuits and succinct functional encryption
-
S. Goldwasser, Y. T. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zeldovich. Reusable garbled circuits and succinct functional encryption. In Proceedings of the Symposium on Theory of Computing, STOC, 2013.
-
(2013)
Proceedings of the Symposium on Theory of Computing, STOC
-
-
Goldwasser, S.1
Kalai, Y.T.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
15
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the ACM International Conference on Management of Data, SIGMOD, 2002.
-
(2002)
Proceedings of the ACM International Conference on Management of Data, SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
17
-
-
84870537144
-
Query processing on encrypted data in the cloud
-
S. Hildenbrand, D. Kossmann, T. Sanamrad, C. Binnig, F. Färber, and J. Wöhler. Query processing on encrypted data in the cloud. Technical Report 735, Department of Computer Science, ETH Zurich, 2011.
-
(2011)
Technical Report 735, Department of Computer Science, ETH Zurich
-
-
Hildenbrand, S.1
Kossmann, D.2
Sanamrad, T.3
Binnig, C.4
Färber, F.5
Wöhler, J.6
-
18
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS, 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium, NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
19
-
-
77956795060
-
Mv-opes: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
-
H. Kadhem, T. Amagasa, and H. Kitagawa. Mv-opes: multivalued-order preserving encryption scheme: a novel scheme for encrypting integer value to many different values. IEICE Transactions on Information and Systems, E93.D:2520-2533, 2010.
-
(2010)
IEICE Transactions on Information and Systems E93.D
, pp. 2520-2533
-
-
Kadhem, H.1
Amagasa, T.2
Kitagawa, H.3
-
21
-
-
77649186056
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology, EUROCRYPT, 2008.
-
(2008)
Advances in Cryptology, EUROCRYPT
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
77950278191
-
Chaotic order preserving encryption for efficient and secure queries on databases
-
S. Lee, T.-J. Park, D. Lee, T. Nam, and S. Kim. Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Transactions on Information and Systems, E92.D:2207-2217, 2009.
-
(2009)
IEICE Transactions on Information and Systems E92.D
, pp. 2207-2217
-
-
Lee, S.1
Park, T.-J.2
Lee, D.3
Nam, T.4
Kim, S.5
-
24
-
-
84910626967
-
Search pattern leakage in searchable encryption: Attacks and new constructions
-
C. Liu, L. Zhu, M. Wang, and Y.-a. Tan. Search pattern leakage in searchable encryption: attacks and new constructions. Technical Report 163, IACR Cryptology ePrint Archive, 2013.
-
(2013)
Technical Report 163, IACR Cryptology EPrint Archive
-
-
Liu, C.1
Zhu, L.2
Wang, M.3
Tan, Y.-A.4
-
26
-
-
84881391444
-
Nonlinear order preserving index for encrypted database query in service cloud environments
-
D. Liu and S. Wang. Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency and Computation: Practice and Experience, 25(13):1967-1984, 2013.
-
(2013)
Concurrency and Computation: Practice and Experience
, vol.25
, Issue.13
, pp. 1967-1984
-
-
Liu, D.1
Wang, S.2
-
31
-
-
84919085619
-
An improved algorithm for computing logarithms over gf(p) and its cryptographic significance
-
S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24(1):106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
33
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP, 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
34
-
-
1542456902
-
The height of a random binary search tree
-
B. Reed. The height of a random binary search tree. Journal of the ACM, 50(3):306-332, 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.3
, pp. 306-332
-
-
Reed, B.1
-
35
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Proceedings of the 2007 Symposium on Security and Privacy, S&P, 2007.
-
(2007)
Proceedings of the 2007 Symposium on Security and Privacy, S&P
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
-
36
-
-
33745618477
-
C-store: A column-oriented dbms
-
M. Stonebraker, D. J. Abadi, A. Batkin, X. Chen, M. Cherniack, M. Ferreira, E. Lau, A. Lin, S. Madden, E. O'Neil, P. O'Neil, A. Rasin, N. Tran, and S. Zdonik. C-store: a column-oriented dbms. In Proceedings of the 31st International Conference on Very Large Data Bases, VLDB, 2005.
-
(2005)
Proceedings of the 31st International Conference on Very Large Data Bases, VLDB
-
-
Stonebraker, M.1
Abadi, D.J.2
Batkin, A.3
Chen, X.4
Cherniack, M.5
Ferreira, M.6
Lau, E.7
Lin, A.8
Madden, S.9
O'neil, E.10
O'neil, P.11
Rasin, A.12
Tran, N.13
Zdonik, S.14
-
37
-
-
84904461962
-
Security analysis for order preserving encryption schemes
-
Department of Computer Science, University of Texas Dallas
-
L. Xiao, O. Bastani, and I.-L. Yen. Security analysis for order preserving encryption schemes. Technical Report UTDCS-01-12, Department of Computer Science, University of Texas Dallas, 2012.
-
(2012)
Technical Report UTDCS-01-12
-
-
Xiao, L.1
Bastani, O.2
Yen, I.-L.3
-
38
-
-
84881224278
-
A note for the ideal order-preserving encryption object and generalized order-preserving encryption
-
L. Xiao and I.-L. Yen. A note for the ideal order-preserving encryption object and generalized order-preserving encryption. Technical Report 350, IACR Cryptology ePrint Archive, 2012.
-
(2012)
Technical Report 350 IACR Cryptology EPrint Archive
-
-
Xiao, L.1
Yen, I.-L.2
-
42
-
-
84910643216
-
Order-preserving encryption for non-uniformly distributed plaintexts
-
D. H. Yum, D. S. Kim, J. S. Kim, P. J. Lee, and S. J. Hong. Order-preserving encryption for non-uniformly distributed plaintexts. In Proceedings of the 12th International Workshop on Information Security Applications, WISA, 2011.
-
(2011)
Proceedings of the 12th International Workshop on Information Security Applications, WISA
-
-
Yum, D.H.1
Kim, D.S.2
Kim, J.S.3
Lee, P.J.4
Hong, S.J.5
-
43
-
-
33746087467
-
Monetdb/x100-A dbms in the cpu cache
-
M. Zukowski, P. A. Boncz, N. Nes, and S. Héman. Monetdb/x100-a dbms in the cpu cache. IEEE Data Engineering Bulletin, 28(2):17-22, 2005.
-
(2005)
IEEE Data Engineering Bulletin
, vol.28
, Issue.2
, pp. 17-22
-
-
Zukowski, M.1
Boncz, P.A.2
Nes, N.3
Héman, S.4
-
44
-
-
33749646126
-
Super-scalar ram-cpu cache compression
-
M. Zukowski, S. Heman, N. Nes, and P. Boncz. Super-scalar ram-cpu cache compression. In Proceedings of the 22nd International Conference on Data Engineering, ICDE, 2006.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering, ICDE
-
-
Zukowski, M.1
Heman, S.2
Nes, N.3
Boncz, P.4
|