Secure range query based on spatial index
暂无分享,去创建一个
Li Li | Jie Li | Yanchao Lu | Congjin Du | Dingxing Xie | Yanchao Lu | Li Li | Dingxing Xie | Congjin Du | Jie Li
[1] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[2] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[3] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[4] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[5] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[6] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[7] Peng Wang,et al. Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[8] S. Rajsbaum. Foundations of Cryptography , 2014 .
[9] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[10] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Philippe Bonnet,et al. Towards Sensor Database Systems , 2001, Mobile Data Management.
[12] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[13] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[14] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[15] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[16] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[17] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[18] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..