-
5
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
(2008)
-
M. Bellare and C. Namprempre. 2008. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21, 4 (2008), 469-491.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
16644381926
-
Modeling and assessing inference exposure in encrypted databases
-
(2005)
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. 2005. Modeling and assessing inference exposure in encrypted databases. ACM Transactions on Information and System Security 8, 1 (2005), 119-152.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 119-152
-
-
Ceselli, A.1
Damiani, E.2
De Capitani di Vimercati, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
12
-
-
70349253957
-
Preserving confidentiality of security policies in data outsourcing
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, and P. Samarati. 2008. Preserving confidentiality of security policies in data outsourcing. In Proc. of the Workshop on Privacy in the Electronic Society (WPES'08).
-
(2008)
Proc. of the Workshop on Privacy in the Electronic Society (WPES'08)
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
16
-
-
84881468744
-
Supporting concurrency and multiple indexes in private access to outsourced data
-
(2013)
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. 2013b. Supporting concurrency and multiple indexes in private access to outsourced data. Journal of Computer Security (JCS) 21, 3 (2013), 425-461.
-
(2013)
Journal of Computer Security (JCS)
, vol.21
, Issue.3
, pp. 425-461
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
18
-
-
79951822560
-
Database access pattern protection without full-shuffles
-
(2011)
-
X. Ding, Y. Yang, and R. H. Deng. 2011. Database access pattern protection without full-shuffles. IEEE Transactions on Information Forensics and Security 6, 1 (2011), 189-201.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 189-201
-
-
Ding, X.1
Yang, Y.2
Deng, R.H.3
-
20
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
(1996)
-
O. Goldreich and R. Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. Journal of the ACM 43, 3 (1996), 431-473.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
25
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
(2012)
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. 2012. Secure multidimensional range queries over outsourced data. The VLDB Journal 21, 3 (2012), 333-358.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
32
-
-
84878298643
-
Enhancing access privacy of range retrievals over B+-trees
-
(2013)
-
H. Pang, J. Zhang, and K. Mouratidis. 2013. Enhancing access privacy of range retrievals over B+-trees. IEEE Transactions on Knowledge and Data Engineering 25, 7 (2013), 1533-1547.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.25
, Issue.7
, pp. 1533-1547
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
33
-
-
84862907810
-
Security challenges for the public cloud
-
(2012)
-
K. Ren, C. Wang, and Q. Wang. 2012. Security challenges for the public cloud. IEEE Internet Computing 16, 1 (2012), 69-73.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
39
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. 2013. Path ORAM: An extremely simple Oblivious RAM protocol. In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS'13).
-
(2013)
Proc. of the 20th ACM Conference on Computer and Communications Security (CCS'13)
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
40
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li. 2013. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proc. of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS'13).
-
(2013)
Proc. of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS'13)
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
42
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
(2012)
-
C. Wang, N. Cao, K. Ren, and W. Lou. 2012. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems 23, 8 (2012), 1467-1479.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
|