-
1
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
Asilomar CA USA. January
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR 2005. Asilomar, CA, USA (January 2005)
-
(2005)
Proc. of CIDR 2005
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
33749642794
-
Sovereign joins
-
Atlanta GA USA. April
-
Agrawal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: Proc. of ICDE 2006. Atlanta, GA, USA (April 2006)
-
(2006)
Proc. of ICDE 2006
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
3
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France. June
-
Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of SIGMOD 2004. Paris, France (June 2004)
-
(2004)
Proc. of SIGMOD 2004
-
-
Agrawal, R.1
Kierman, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control: A result of the prime project
-
Ardagna, C.A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. JCS 18(1), 123-160 (2010)
-
(2010)
JCS
, vol.18
, Issue.1
, pp. 123-160
-
-
Ardagna, C.A.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
5
-
-
78649257622
-
Minimizing disclosure of private information in credential-based interactions: A graph-based approach
-
Minneapolis, MN, USA, August
-
Ardagna, C.A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In: Proc. of PASSAT 2010. Minneapolis, MN, USA (August 2010)
-
(2010)
Proc. of PASSAT 2010
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
78650214790
-
Supporting privacy preferences in credential-based interactions
-
Chicago, IL, USA October
-
Ardagna, C.A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Supporting privacy preferences in credential-based interactions. In: Proc. of WPES 2010. Chicago, IL, USA (October 2010)
-
(2010)
Proc. of WPES 2010
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
7
-
-
84868251115
-
Minimising disclosure of client information in credential-based interactions
-
Ardagna, C.A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimising disclosure of client information in credential-based interactions. IJIPSI 1(2/3), 205-233 (2012)
-
(2012)
IJIPSI
, vol.1
, Issue.2-3
, pp. 205-233
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
8
-
-
81455141558
-
Expressive and deployable access control in open web service applications
-
April-June
-
Ardagna, C.A., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P., Verdicchio, M.: Expressive and deployable access control in open Web service applications. IEEE TSC 4(2), 96-109 (April-June 2011)
-
(2011)
IEEE TSC
, vol.4
, Issue.2
, pp. 96-109
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
Verdicchio, M.6
-
9
-
-
85192413792
-
Providing users' anonymity in mobile hybrid networks
-
Ardagna, C.A., Jajodia, S., Samarati, P., Stavrou, A.: Providing users' anonymity in mobile hybrid networks. ACM TOIT (2013)
-
(2013)
ACM TOIT
-
-
Ardagna, C.A.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
10
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
January
-
Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM TISSEC 12(3), 18:1-18:43 (January 2009)
-
(2009)
ACM TISSEC
, vol.12
, Issue.3
, pp. 181-1843
-
-
Atallah, M.1
Blanton, M.2
Fazio, N.3
Frikken, K.4
-
11
-
-
84948745350
-
On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard
-
San Jose CA USA July
-
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard. In: Proc. of ASAP 2002. San Jose, CA, USA (July 2002)
-
(2002)
Proc. of ASAP 2002
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
12
-
-
85192431126
-
Efficient multi-dimensional key management in broadcast services
-
Athens, Grece September
-
Blanton, M., Frikken, K.: Efficient multi-dimensional key management in broadcast services. In: Proc. of ESORICS 2010. Athens, Grece (September 2010)
-
(2010)
Proc. of ESORICS 2010
-
-
Blanton, M.1
Frikken, K.2
-
13
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the Web. JCS 10(3), 241-272 (2002)
-
(2002)
JCS
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
14
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Warsaw, Poland May
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Proc. of EUROCRYPT 2003. Warsaw, Poland (May 2003)
-
(2003)
Proc. of EUROCRYPT 2003
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
15
-
-
52649085759
-
Querying data under access limitations
-
Cancun, Mexico April
-
Calì, A., Martinenghi, D.: Querying data under access limitations. In: Proc. of ICDE 2008. Cancun, Mexico (April 2008)
-
(2008)
Proc. of ICDE 2008
-
-
Calì, A.1
Martinenghi, D.2
-
16
-
-
0013175080
-
An efficient system for non-Transferable anonymous credentials with optional anonymity revocation
-
Innsbruck, Austria May
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-Transferable anonymous credentials with optional anonymity revocation. In: Proc. of EUROCRYPT 2001. Innsbruck, Austria (May 2001)
-
(2001)
Proc. of EUROCRYPT 2001
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
February
-
Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 8(1), 119-152 (February 2005)
-
(2005)
ACM TISSEC
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
18
-
-
0032201622
-
Private information retrieval
-
April
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of ACM 45(6), 965-981 (April 1998)
-
(1998)
Journal of ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
19
-
-
60649105959
-
Privacy-Aware biometrics: Design and implementation of a multimodal verification system
-
Anaheim CA USA December
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-Aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008. Anaheim, CA, USA (December 2008)
-
(2008)
Proc. of ACSAC 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
20
-
-
70350355128
-
Keep a few: Outsourcing data while maintaining confidentiality
-
Saint Malo, France September
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Proc. of ESORICS 2009. Saint Malo, France (September 2009)
-
(2009)
Proc. of ESORICS 2009
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
21
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
July
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (July 2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
, pp. 221-2233
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
22
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational dbmss
-
Washington DC USA October
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003. Washington, DC, USA (October 2003)
-
(2003)
Proc. of CCS 2003
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
23
-
-
84888305233
-
Enforcing dynamic write privileges in data outsourcing
-
November
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G. Paraboschi, S., Samarati, P.: Enforcing Dynamic Write Privileges in Data Outsourcing. COSE 39(A), 47-63 (November 2013)
-
(2013)
COSE
, vol.39
, Issue.A
, pp. 47-63
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga G. Paraboschi, S.4
Samarati, P.5
-
24
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
April
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1-12:46 (April 2010)
-
(2010)
ACM TODS
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
25
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
September
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370-1381 (September 2010)
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
26
-
-
79960761612
-
Authorization enforcement in distributed query evaluation
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Authorization enforcement in distributed query evaluation. JCS 19(4), 751-794 (2011)
-
(2011)
JCS
, vol.19
, Issue.4
, pp. 751-794
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
27
-
-
80955143483
-
Private data indexes for selective access to outsourced data
-
Chicago, IL, USA October
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private data indexes for selective access to outsourced data. In: Proc. of WPES 2011. Chicago, IL, USA (October 2011)
-
(2011)
Proc. of WPES 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
28
-
-
84881438234
-
On information leakage by indexes over data fragments
-
Brisbane, Australia April
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: On information leakage by indexes over data fragments. In: Proc. of PrivDB 2013. Brisbane, Australia (April 2013)
-
(2013)
Proc. of PrivDB 2013
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
29
-
-
80051865953
-
Efficient and private access to outsourced data
-
Minneapolis, MN, USA June
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011. Minneapolis, MN, USA (June 2011)
-
(2011)
Proc. of ICDCS 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
30
-
-
80053026532
-
Supporting concurrency in private data outsourcing
-
Leuven, Belgium September
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency in private data outsourcing. In: Proc. of ESORICS 2011. Leuven, Belgium (September 2011)
-
(2011)
Proc. of ESORICS 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
31
-
-
84883985628
-
Protecting data in outsourcing scenarios
-
In: Das, S., Kant, K., Zhang, N. (eds.). Morgan Kaufmann
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Protecting data in outsourcing scenarios. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann (2012)
-
(2012)
Handbook on Securing Cyber-Physical Critical Infrastructure
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
32
-
-
77954592905
-
Fully homomorphic encryption using ideal lattices
-
Bethesda MA USA May
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009. Bethesda, MA, USA (May 2009)
-
(2009)
Proc. of STOC 2009
-
-
Gentry, C.1
-
33
-
-
84904329628
-
Privacy-preserving group data access via stateless oblivious ram simulation
-
Kyoto, Japan January
-
Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless Oblivious RAM simulation. In: Proc. of SODA 2012. Kyoto, Japan (January 2012)
-
(2012)
Proc. of SODA 2012
-
-
Goodrich, M.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
34
-
-
0036204131
-
Providing database as a service
-
San Jose CA USA February
-
Hacigümüs, H., Iyer, B.,Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002. San Jose, CA, USA (February 2002)
-
(2002)
Proc. of ICDE 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
35
-
-
84967222929
-
Ensuring integrity of encrypted databases in database as a service model
-
Estes Park CO USA August
-
Hacigümüs, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: Proc. of DBSec 2003. Estes Park, CO, USA (August 2003)
-
(2003)
Proc. of DBSec 2003
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
36
-
-
16644385952
-
Efficient execution of aggregation queries over encrypted relational databases
-
Jeju Island, Korea March
-
Hacigümüs, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Proc. of DASFAA 2004. Jeju Island, Korea (March 2004)
-
(2004)
Proc. of DASFAA 2004
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
37
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Madison WI USA June
-
Hacigümüs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD 2002. Madison, WI, USA (June 2002)
-
(2002)
Proc. of SIGMOD 2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
38
-
-
85088717937
-
Fault tolerance management in iaas clouds
-
Rome, Italy October
-
Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012. Rome, Italy (October 2012)
-
(2012)
Proc. of ESTEL 2012
-
-
Jhawar, R.1
Piuri, V.2
-
39
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Paphos, Cyprus December
-
Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012. Paphos, Cyprus (December 2012)
-
(2012)
Proc. of CSE 2012
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
40
-
-
84883935872
-
Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations
-
Auckland, New Zealand August
-
Kärger, P., Olmedilla, D., Balke,W.T.: Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations. In: Proc. of SDM 2008. Auckland, New Zealand (August 2008)
-
(2008)
Proc. of SDM 2008
-
-
Kärger, P.1
Olmedilla, D.2
Balke, W.T.3
-
41
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago IL USA June
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of SIGMOD 2006. Chicago, IL, USA (June 2006)
-
(2006)
Proc. of SIGMOD 2006
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
42
-
-
85128992094
-
Controlling access to published data using cryptography
-
Berlin, Germany September
-
Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB 2003. Berlin, Germany (September 2003)
-
(2003)
Proc. of VLDB 2003
-
-
Miklau, G.1
Suciu, D.2
-
43
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
May
-
Mykletun, E., Narasimha,M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS 2(2), 107-138 (May 2006)
-
(2006)
ACM TOS
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
44
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Beijing, China April
-
Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proc. of ASIACCS 2010. Beijing, China (April 2010)
-
(2010)
Proc. of ASIACCS 2010
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
45
-
-
84893821498
-
Efficient secure query evaluation over encrypted xml databases
-
Seoul, Korea September
-
Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006. Seoul, Korea (September 2006)
-
(2006)
Proc. of VLDB 2006
-
-
Wang, H.1
Lakshmanan, L.2
-
46
-
-
70349251911
-
Dual encryption for query integrity assurance
-
Napa Valley CA USA October
-
Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proc. of CIKM 2008. Napa Valley, CA, USA (October 2008)
-
(2008)
Proc. of CIKM 2008
-
-
Wang, H.1
Yin, J.2
Perng, C.3
Yu, P.4
-
47
-
-
84869381921
-
Single round access privacy on outsourced storage
-
Raleigh, NC, USA October
-
Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proc. of CCS 2012. Raleigh, NC, USA (October 2012)
-
(2012)
Proc. of CCS 2012
-
-
Williams, P.1
Sion, R.2
-
48
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Alexandria VA USA October
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: Proc. of CCS 2008. Alexandria, VA, USA (October 2008)
-
(2008)
Proc. of CCS 2008
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
49
-
-
0033893174
-
Secure group communications using key graphs
-
February
-
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM TON 8(1), 16-30 (February 2000)
-
(2000)
IEEE/ACM TON
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
50
-
-
84997556980
-
Integrity auditing of outsourced data
-
Vienna, Austria September
-
Xie, M.,Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of VLDB 2007. Vienna, Austria (September 2007)
-
(2007)
Proc. of VLDB 2007
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
51
-
-
43349091759
-
Providing freshness guarantees for outsourced databases
-
Nantes, France March
-
Xie,M.,Wang, H., Yin, J.,Meng, X.: Providing freshness guarantees for outsourced databases. In: Proc. of EDBT 2008. Nantes, France (March 2008)
-
(2008)
Proc. of EDBT 2008
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
52
-
-
70849087019
-
Authenticated join processing in outsourced databases
-
Providence RI USA June-July
-
Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: Proc. of SIGMOD 2009. Providence, RI, USA (June-July 2009)
-
(2009)
Proc. of SIGMOD 2009
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
53
-
-
56349121668
-
Private information: To reveal or not to reveal
-
October
-
Yao, D., Frikken, K., Atallah, M., Tamassia, R.: Private information: To reveal or not to reveal. ACM TISSEC 12(1), 1-27 (October 2008)
-
(2008)
ACM TISSEC
, vol.12
, Issue.1
, pp. 1-27
-
-
Yao, D.1
Frikken, K.2
Atallah, M.3
Tamassia, R.4
|