-
1
-
-
85028495084
-
-
Amazon web services
-
Amazon web services, aws.amazon.com.
-
-
-
-
2
-
-
84938121453
-
-
Google app engine
-
Google app engine, code.google.com/appengine.
-
-
-
-
3
-
-
84938121454
-
-
Microsoft azure
-
Microsoft azure, www.microsoft.com/azure.
-
-
-
-
5
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD, pages 563-574. ACM, 2004.
-
(2004)
Proceedings of the ACM SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
9
-
-
67650690965
-
Order-preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In EUROCRYPT, pages 224-241, 2009.
-
(2009)
EUROCRYPT
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
10
-
-
84881219587
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
-
(2011)
CRYPTO
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
12
-
-
33751053984
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
X. Boyen and B. Waters. Anonymous hierarchical identity-based encryption (without random oracles). In CRYPTO, 2006.
-
(2006)
CRYPTO
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In Proceedings of the 28th ACM symposium on Theory of computing (STOC), pages 639-648. ACM, 1996.
-
(1996)
Proceedings of the 28th ACM symposium on Theory of computing (STOC)
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
14
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
16
-
-
34547240272
-
Searchable symmetric encryption: improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
17
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, G. A. J., S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security, 19:895-934, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
18
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
E. Damiani, S. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, pages 93-102, 2003.
-
(2003)
CCS
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
19
-
-
84938058496
-
-
Stanford University Technical Report
-
Eujin-Goh. Secure indexes. Stanford University Technical Report, 2004.
-
(2004)
Secure indexes
-
-
Eu Jin, G.1
-
21
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
May
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of ACM, 43(3):431-473, May 1996.
-
(1996)
Journal of ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
23
-
-
0035278163
-
Algorithms for packet classification
-
P. Gupta and N. McKeown. Algorithms for packet classification. IEEE Network, 15(2):24-32, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
24
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, 2002.
-
(2002)
SIGMOD
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
25
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
June
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3):333-358, June 2012.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
26
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720-731, 2004.
-
(2004)
VLDB
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
28
-
-
34247399538
-
Security issues in querying encrypted data
-
M. Kantarcioglu and C. Clifton. Security issues in querying encrypted data. In DBSec, 2005.
-
(2005)
DBSec
-
-
Kantarcioglu, M.1
Clifton, C.2
-
31
-
-
67649645974
-
Efficiency and security trade-off in supporting range queries on encrypted databases
-
J. Li and E. R. Omiecinski. Efficiency and security trade-off in supporting range queries on encrypted databases. In 19th DBSec, 2005.
-
(2005)
19th DBSec
-
-
Li, J.1
Omiecinski, E.R.2
-
32
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and l-diversity
-
April
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on, pages 106-115, April 2007.
-
(2007)
Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
33
-
-
57549111039
-
Collaborative enforcement of firewall policies in virtual private networks
-
A. X. Liu and F. Chen. Collaborative enforcement of firewall policies in virtual private networks. In Proc. ACM PODC, 2008.
-
(2008)
Proc. ACM PODC
-
-
Liu, A.X.1
Chen, F.2
-
34
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
May
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. Trans. Storage, 2(2):107-138, May 2006.
-
(2006)
Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
35
-
-
79958167312
-
Privacy preserving clustering by data transformation
-
S. R. M. Oliveira and O. R. Zaïane. Privacy preserving clustering by data transformation. JIDM, 1(1):37-52, 2010.
-
(2010)
JIDM
, vol.1
, Issue.1
, pp. 37-52
-
-
Oliveira, S.R.M.1
Zaïane, O.R.2
-
36
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. In Information Security Applications, pages 73-86. 2005.
-
(2005)
Information Security Applications
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
37
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84, pages 47-53, 1985.
-
(1985)
CRYPTO 84
, pp. 47-53
-
-
Shamir, A.1
-
38
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In IEEE S&P Symposium, 2007.
-
(2007)
IEEE S&P Symposium
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
41
-
-
70849131456
-
Secure knn computation on encrypted databases
-
July
-
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In SIGMOD, pages 139-152, July 2009.
-
(2009)
SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
|