-
1
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits". SIAM Journal on Computing. 3: 850-864, 1984.
-
(1984)
SIAM Journal on Computing
, vol.3
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
85156635541
-
-
Ph.D. Thesis at Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland Ohio U.S.A. September, Available at
-
Sun S. Chung, "Anti-Tamper Databases: Querying Encrypted Databases", Ph.D. Thesis at Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland Ohio U.S.A., September 2005. Available at http://eecs.case.edu/chung/.
-
(2005)
Anti-Tamper Databases: Querying Encrypted Databases
-
-
Chung, S.S.1
-
4
-
-
0002275623
-
Of nest and trees: A unified approach to proceeding queries that contain nested subqueries, aggregates, and quantifiers
-
Brighton
-
U. Dayal, "Of Nest and Trees: A Unified Approach to Proceeding Queries That Contain Nested Subqueries, Aggregates, and Quantifiers", in the Proceedings of the 13th VLDB, Brighton, 1987.
-
(1987)
The Proceedings of the 13th VLDB
-
-
Dayal, U.1
-
5
-
-
0040746831
-
Orthogonal optimization of subqueries and aggregation
-
Santa Barbara, California, May
-
C. A. Galindo-Legaria, M. M. Joshi, "Orthogonal Optimization of Subqueries and Aggregation", in the Proceedings of ACM SIGMOD, Santa Barbara, California, May 2001.
-
(2001)
The Proceedings of ACM SIGMOD
-
-
Galindo-Legaria, C.A.1
Joshi, M.M.2
-
7
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison
-
Hakan Hacigumus, Balakrishna R. Iyer, Li Chen, Sharad Mehrotra, "Executing SQL over Encrypted Data in the Database-Service-Provider Model", In Proceedings of ACM SIGMOD, Madison, 2002.
-
(2002)
Proceedings of ACM SIGMOD
-
-
Hacigumus, H.1
Iyer, B.R.2
Chen, L.3
Mehrotra, S.4
-
8
-
-
84990954244
-
Security vulnerabilities and conflicts of interest in the provider- clearinghouse∗-payer model
-
Stanford, May
-
B. Kiraly, A. Podgrusky, and S. Hoffman, "Security Vulnerabilities and Conflicts of Interest in the Provider- Clearinghouse∗-Payer Model", In the PORTIA Workshop, Stanford, May, 2004.
-
(2004)
The PORTIA Workshop
-
-
Kiraly, B.1
Podgrusky, A.2
Hoffman, S.3
-
9
-
-
0020182801
-
On optimizing an SQL-like nested query
-
W. Kim. On Optimizing an SQL-like Nested Query. ACM Transaction on Databases Systems, 7(3): 443-469, 1982.
-
(1982)
ACM Transaction on Databases Systems
, vol.7
, Issue.3
, pp. 443-469
-
-
Kim, W.1
-
10
-
-
0036361163
-
Skew handling techniques in sort-merge join
-
Madison Wisconsin, June
-
W. Li, D. Gao, and R. Snodgrass, "Skew Handling Techniques in Sort-Merge Join", In Proceedings of ACM SIGMOD, Madison Wisconsin, June 2002.
-
(2002)
Proceedings of ACM SIGMOD
-
-
Li, W.1
Gao, D.2
Snodgrass, R.3
-
11
-
-
84866261796
-
Anti-Tamper databases: Querying encrypted databases
-
Estate Park, Colorado, August
-
Gultekin Ozsoyoglu, David Singer, Sun S. Chung, "Anti-Tamper Databases: Querying Encrypted Databases", In the Proceedings of IFIP11.3 Working Conference on Database Security, Estate Park, Colorado, August 2003.
-
(2003)
The Proceedings of IFIP11.3 Working Conference on Database Security
-
-
Ozsoyoglu, G.1
Singer, D.2
Chung, S.S.3
-
12
-
-
0005301490
-
On data banks and privacy homomorphisms
-
in R. A. DeMillo et al. eds., Academic Press, N.Y.C
-
R. L. Rivest, L. Adleman and M.L. Dertouzos, On data banks and privacy homomorphisms, in R. A. DeMillo et al., eds., Foundations of Secure Computation, pp169- 179, Academic Press, N.Y.C, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
|