-
2
-
-
79959972183
-
TrustedDB: A trusted hardware based database with privacy and data confidentiality
-
S. Bajaj and R. Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, 2011.
-
(2011)
SIGMOD
-
-
Bajaj, S.1
Sion, R.2
-
3
-
-
84881219587
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
A. Boldyreva, N. Chenette, and A. O’Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
-
(2011)
CRYPTO
-
-
Boldyreva, A.1
Chenette, N.2
O’Neill, A.3
-
4
-
-
85072871162
-
-
Dropbox. http://www.dropbox.com.
-
-
-
-
5
-
-
84870691127
-
FPGAs for trusted cloud computing
-
K. Eguro and R. Venkatesan. FPGAs for trusted cloud computing. In FPL, 2012.
-
(2012)
FPL
-
-
Eguro, K.1
Venkatesan, R.2
-
6
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3), 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
-
-
Gentry, C.1
-
7
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. J. ACM, 43(3):431–473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
8
-
-
34547970191
-
AES on FPGA from the fastest to the smallest
-
T. Good and M. Benaissa. AES on FPGA from the fastest to the smallest. In CHES, 2005.
-
(2005)
CHES
-
-
Good, T.1
Benaissa, M.2
-
9
-
-
79959681766
-
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
-
Michael T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, pages 379–388, 2011.
-
(2011)
SPAA
, pp. 379-388
-
-
Goodrich, M.T.1
-
10
-
-
85072865128
-
-
Amazon Web Services LLC. AWS GovCloud. http://aws.amazon.com/govcloud-us/.
-
AWS GovCloud
-
-
-
11
-
-
85072867140
-
Founding cryptography on tamper-proof hardware tokens
-
V. Goyal, Y. Ishai, A. Sahai, R. Venkatesan, and A. Wadia. Founding cryptography on tamper-proof hardware tokens. In TCC, 2010.
-
(2010)
TCC
-
-
Goyal, V.1
Ishai, Y.2
Sahai, A.3
Venkatesan, R.4
Wadia, A.5
-
12
-
-
0001890225
-
The cascades framework for query optimization
-
G. Graefe. The cascades framework for query optimization. IEEE Data Eng. Bull., 18(3), 1995.
-
(1995)
IEEE Data Eng. Bull.
, vol.18
, Issue.3
-
-
Graefe, G.1
-
13
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, et al. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD, 2002.
-
(2002)
SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.R.2
-
14
-
-
0027621744
-
Predicate migration: Optimizing queries with expensive predicates
-
J. M. Hellerstein and M. Stonebraker. Predicate migration: Optimizing queries with expensive predicates. In SIGMOD, 1993.
-
(1993)
SIGMOD
-
-
Hellerstein, J.M.1
Stonebraker, M.2
-
17
-
-
0003584029
-
-
National Institute of Standards Information Technology Laboratory and Technology
-
National Institute of Standards Information Technology Laboratory and Technology. Security requirements for cryptographic modules, 2001.
-
(2001)
Security Requirements for Cryptographic Modules
-
-
-
19
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
R. A. Popa, C. M. S. Redfield, N. Zeldovich, et al. Cryptdb: protecting confidentiality with encrypted query processing. In SOSP, pages 85–100, 2011.
-
(2011)
SOSP
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
-
20
-
-
33745601730
-
Query execution assurance for outsourced databases
-
Radu Sion. Query execution assurance for outsourced databases. In VLDB, 2005.
-
(2005)
VLDB
-
-
Sion, R.1
-
21
-
-
17644364039
-
Design and analysis of dual-rail circuits for security applications
-
Danil Sokolov, Julian Murphy, Alexander Bystrov, and Alex Yakovlev. Design and analysis of dual-rail circuits for security applications. IEEE Transactions on Computers, 54:449–460, 2005.
-
(2005)
IEEE Transactions on Computers
, vol.54
, pp. 449-460
-
-
Sokolov, D.1
Murphy, J.2
Bystrov, A.3
Yakovlev, A.4
-
22
-
-
80955132243
-
Towards practical oblivious RAM
-
E. Stefanov, E. Shi, and D. Song. Towards Practical Oblivious RAM. CoRR, abs/1106.3652, 2011.
-
(2011)
CoRR
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
23
-
-
85072860477
-
Germany tackles tax evasion
-
Feb 7
-
Germany Tackles Tax Evasion. Wall Street Journal, Feb 7 2010.
-
(2010)
Wall Street Journal
-
-
|