-
1
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigms, H., Lyer, B., Li, C., Mhrotra, S.: Executing sql over encrypted data in the database-server-provider model. In: SIGMOD, pp. 216-227. ACM (2002) (Pubitemid 34985549)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
2
-
-
77956137294
-
Cryptographic cloud storage
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb́e, F. (eds.) Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb́e, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
RLCPS, WECSR, and WLC 2010. LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
3
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE
-
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55. IEEE (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
4
-
-
33646723217
-
Secure indexes
-
Goh, E.J.: Secure indexes. In: IACR (2003)
-
(2003)
IACR
-
-
Goh, E.J.1
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: ACM CCS, pp. 79-88. ACM (2006) (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
6
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
IEEE
-
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: INFOCOM, pp. 829-837. IEEE (2011)
-
(2011)
INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
Canetti, R., Garay, J.A. (eds.) Springer, Heidelberg
-
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro̧su, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353-373. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Ro̧su, M.-C.5
Steiner, M.6
-
8
-
-
70849131456
-
Secure knn computation on encrypted databases
-
ACM
-
Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: SIGMOD, pp. 139-152. ACM (2009)
-
(2009)
SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
9
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
Jonker, W., Petkovíc, M. (eds.) Springer, Heidelberg
-
van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Jonker, W., Petkovíc, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 87-100. Springer, Heidelberg (2010)
-
(2010)
SDM 2010. LNCS
, vol.6358
, pp. 87-100
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
10
-
-
84864234736
-
Efficient similarity search over encrypted data
-
IEEE
-
Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: ICDE, pp. 1156-1167. IEEE (2012)
-
(2012)
ICDE
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
11
-
-
79957834847
-
Processing private queries over untrusted sata cloud through privacy homomorphism
-
IEEE
-
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted sata cloud through privacy homomorphism. In: ICDE, pp. 601-612. IEEE (2011)
-
(2011)
ICDE
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
12
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
ACM
-
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM CCS, pp. 965-976. ACM (2012)
-
(2012)
ACM CCS
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
13
-
-
35048901123
-
Public encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
14
-
-
38049138213
-
Public key encryption that allows pir queries
-
Menezes, A. (ed.) Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public key encryption that allows pir queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith III, W.E.4
|