-
1
-
-
3142716056
-
Order-preserving encryption for numeric data
-
ACM
-
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order-preserving encryption for numeric data. In SIGMOD Conference, pages 563-574. ACM, 2004.
-
(2004)
SIGMOD Conference
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
0005314588
-
Cryptographic hash functions: A survey
-
Department of Computer Science, University of Wollongong
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk. Cryptographic hash functions: A survey. Technical Report 95-02, Department of Computer Science, University of Wollongong, 1995.
-
(1995)
Technical Report 95-02
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway. A concrete security treatment of symmetric encryption. In FOCS, pages 394-403, 1997.
-
(1997)
FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
6
-
-
77958484856
-
Authentic third-party data publication
-
Kluwer
-
Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, and Stuart G. Stubblebine. Authentic third-party data publication. In DBSec, Volume 201 of IFIP Conference Proceedings, pages 101-112. Kluwer, 2000.
-
(2000)
DBSec, Volume 201 of IFIP Conference Proceedings
, pp. 101-112
-
-
Devanbu, P.T.1
Gertz, M.2
Martel, C.U.3
Stubblebine, S.G.4
-
7
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
ACM
-
Hakan Hacigümüs, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD Conference, pages 216-227. ACM, 2002.
-
(2002)
SIGMOD Conference
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
8
-
-
0036204131
-
Providing database as a service
-
IEEE Computer Society
-
Hakan Hacigümüs, Sharad Mehrotra, and Balakrishna R. Iyer. Providing database as a service. In ICDE, pages 29. IEEE Computer Society, 2002.
-
(2002)
ICDE
, pp. 29
-
-
Hacigümüs, H.1
Mehrotra, S.2
Iyer, B.R.3
-
9
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
ACM
-
Feifei Li, Marios Hadjieleftheriou, George Kollios, and Leonid Reyzin. Dynamic authenticated index structures for outsourced databases. In SIGMOD Conference, pages 121-132. ACM, 2006.
-
(2006)
SIGMOD Conference
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
11
-
-
24944520998
-
Authentication and integrity in outsourced databases
-
The Internet Society
-
Einar Mykletun, Maithili Narasimha, and Gene Tsudik. Authentication and integrity in outsourced databases. In NDSS. The Internet Society, 2004.
-
(2004)
NDSS
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
12
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
ACM
-
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, and Kian-Lee Tan. Verifying completeness of relational query results in data publishing. In SIGMOD Conference, pages 407-418. ACM, 2005.
-
(2005)
SIGMOD Conference
, pp. 407-418
-
-
Pang, H.H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
13
-
-
2442590644
-
Authenticating query results in edge computing
-
IEEE Computer Society
-
HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge computing. In ICDE, pages 560-571. IEEE Computer Society, 2004.
-
(2004)
ICDE
, pp. 560-571
-
-
Pang, H.H.1
Tan, K.-L.2
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
33745601730
-
Query execution assurance for outsourced databases
-
ACM
-
Radu Sion. Query execution assurance for outsourced databases. In VLDB, pages 601-612. ACM, 2005.
-
(2005)
VLDB
, pp. 601-612
-
-
Sion, R.1
|