-
1
-
-
85017483583
-
-
Amazon, Amazon simple storage service. URL:.
-
[1] Amazon, Amazon simple storage service. URL: http://aws.amazon.com/s3.
-
-
-
-
2
-
-
85017484751
-
-
Megaupload, Megaupload. URL:.
-
[2] Megaupload, Megaupload. URL: http://www.megaupload.com.
-
-
-
-
3
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
in: Proc. of IEEE Symposium on Security and Privacy,.
-
[3] D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proc. of IEEE Symposium on Security and Privacy, 2000, p. 44.
-
(2000)
, pp. 44
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
in: Proc. of Proc. of EUROCRYPT 2004,
-
[4] D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Proc. of Proc. of EUROCRYPT 2004, 2004, pp. 506–522.
-
(2004)
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
34748812366
-
Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report 2004/051
-
[5] Chang, Y.-C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report 2004/051., 2004 http://eprint.iacr.org/.
-
(2004)
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
6
-
-
33745785145
-
Building secure indexes for searching efficiently on encrypted compressed data
-
Online URL:.
-
[6] E.-J. Goh, Building secure indexes for searching efficiently on encrypted compressed data, Online (2003). URL: http://eprint.iacr.org/2003/216/.
-
(2003)
-
-
Goh, E.-J.1
-
7
-
-
84865590663
-
Secure and efficient outsourcing of sequence comparisons
-
[7] Blanton, M., Atallah, M.J., Frikken, K.B., Malluhi, Q., Secure and efficient outsourcing of sequence comparisons. Foresti ESORICS 2012 LNCS, 2012, 505–522.
-
(2012)
Foresti ESORICS 2012, LNCS
, pp. 505-522
-
-
Blanton, M.1
Atallah, M.J.2
Frikken, K.B.3
Malluhi, Q.4
-
8
-
-
84856182117
-
Achieving full security in privacy-preserving data mining
-
in: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust,.
-
[8] M. Blanton, Achieving full security in privacy-preserving data mining, in: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust, 2011.
-
(2011)
-
-
Blanton, M.1
-
9
-
-
85017492308
-
Multi-keyword similarity search over encrypted cloud data, Cryptology ePrint Archive, Report 2015/137
-
URL:
-
[9] Strizhov, M., Ray, I., Multi-keyword similarity search over encrypted cloud data, Cryptology ePrint Archive, Report 2015/137., 2015 URL: https://eprint.iacr.org.
-
(2015)
-
-
Strizhov, M.1
Ray, I.2
-
10
-
-
84897447237
-
An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data
-
[10] Chen, L., Sun, X., Xia, Z., Liu, Q., An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data. Int. J. Secur. Appl., 2014.
-
(2014)
Int. J. Secur. Appl.
-
-
Chen, L.1
Sun, X.2
Xia, Z.3
Liu, Q.4
-
11
-
-
85017485130
-
Sorting and searching behind the curtain
-
in: Financial Cryptography,.
-
[11] F. Baldimtsi, O. Ohrimenko, Sorting and searching behind the curtain, in: Financial Cryptography, 2015.
-
(2015)
-
-
Baldimtsi, F.1
Ohrimenko, O.2
-
12
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
[12] G. Oded, O. Rafail, Software protection and simulation on oblivious rams, Vol. 43, 1996. URL: http://doi.acm.org/10.1145/233551.233553.
-
(1996)
, vol.43
-
-
Oded, G.1
Rafail, O.2
-
13
-
-
34548706878
-
Software protection and simulation on oblivious rams
-
(mit Ph.D. thesis) Online. URL:
-
[13] Ostrovsky, R., Software protection and simulation on oblivious rams. (mit Ph.D. thesis), 2009 Online. URL: http://www.cs.ucla.edu/~rafail/PUBLIC/09.pdf.
-
(2009)
-
-
Ostrovsky, R.1
-
14
-
-
84861183066
-
Oblivious ram revisited
-
Online URL:.
-
[14] B. Pinkas, T. Reinman, Oblivious ram revisited, Online (2010). URL: http://eprint.iacr.org/2010/366.pdf.
-
(2010)
-
-
Pinkas, B.1
Reinman, T.2
-
15
-
-
84893808472
-
Search pattern leakage in searchable encryption: Attacks and new construction
-
[15] Liu, C., Zhu, L., Wang, M., Tan, Y., Search pattern leakage in searchable encryption: Attacks and new construction. Inform. Sci. 265 (2014), 176–188.
-
(2014)
Inform. Sci.
, vol.265
, pp. 176-188
-
-
Liu, C.1
Zhu, L.2
Wang, M.3
Tan, Y.4
-
16
-
-
0342880858
-
Studiesin secure multi-party computation and applications
-
(Ph.D. thesis) Weizmann Institue of Science Israel
-
[16] Canetti, R., Studiesin secure multi-party computation and applications. (Ph.D. thesis), 1995, Weizmann Institue of Science, Israel.
-
(1995)
-
-
Canetti, R.1
-
17
-
-
84914148700
-
Blind seer: A scalable private dbms
-
IEEE Computer Society Washington, DC, USA
-
[17] Vasilis, P., Fernando, K., Binh, V., Vladimir, K., Tal, M., Geol, C.S., Wesley, G., Angelos, K., Steve, B., Blind seer: A scalable private dbms. Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP’14, 2014, IEEE Computer Society, Washington, DC, USA, 359–374, 10.1109/SP.2014.30.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP’14
, pp. 359-374
-
-
Vasilis, P.1
Fernando, K.2
Binh, V.3
Vladimir, K.4
Tal, M.5
Geol, C.S.6
Wesley, G.7
Angelos, K.8
Steve, B.9
-
18
-
-
85012302781
-
Malicious-client security in Blind Seer: A scalable private DBMS
-
in: IEEE Symposium on Security and Privacy URL:.
-
[18] B.A. Fisch, B. Vo, F. Krell, A. Kumarasubramanian, V. Kolesnikov, T. Malkin, S.M. Bellovin, Malicious-client security in Blind Seer: A scalable private DBMS, in: IEEE Symposium on Security and Privacy, 2015. URL: http://www.ieee-security.org/TC/SP2015/papers/6949a395.pdf.
-
(2015)
-
-
Fisch, B.A.1
Vo, B.2
Krell, F.3
Kumarasubramanian, A.4
Kolesnikov, V.5
Malkin, T.6
Bellovin, S.M.7
-
19
-
-
84947928286
-
Practice-oriented provable-security
-
Springer-Verlag
-
[19] Bellare, M., Practice-oriented provable-security. Proceedings of First International Workshop on Information Security, (ISW 97) Lecture Notes in Computer Science, vol. 1396, 1998, Springer-Verlag.
-
(1998)
Proceedings of First International Workshop on Information Security, (ISW 97), Lecture Notes in Computer Science
, vol.1396
-
-
Bellare, M.1
-
20
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
-
IEEE
-
[20] Bellare, M., Desai, A., Jokipii, E., Rogaway, P., A concrete security treatment of symmetric encryption: Analysis of the des modes of operation. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997, IEEE.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
21
-
-
84983089516
-
The security of the cipher block chaining message authentication code
-
Springer-Verlag
-
[21] Bellare, M., Kilian, J., Rogaway, P., The security of the cipher block chaining message authentication code. Proceedings of CRYPTO’94 Lecture Notes in Computer Science, vol. 839, 1994, Springer-Verlag.
-
(1994)
Proceedings of CRYPTO’94, Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
22
-
-
0003741171
-
Statistical Tables for Biological, Agricultural and Medical Research
-
third ed. Oliver & Boyd London
-
[22] Ronald, A.F., Frank, S.Y., Statistical Tables for Biological, Agricultural and Medical Research. third ed., 1948, Oliver & Boyd, London.
-
(1948)
-
-
Ronald, A.F.1
Frank, S.Y.2
-
23
-
-
0008489840
-
Seminumerical algorithms
-
[23] Donald, E.K., Seminumerical algorithms. Art Comput. Program. 2 (1969), 124–125.
-
(1969)
Art Comput. Program.
, vol.2
, pp. 124-125
-
-
Donald, E.K.1
-
24
-
-
0000886528
-
Algorithm 235: Random permutation
-
[24] Durstenfeld, R., Algorithm 235: Random permutation. Commun. ACM 7 (1964), 420–421.
-
(1964)
Commun. ACM
, vol.7
, pp. 420-421
-
-
Durstenfeld, R.1
|