Encryption Techniques for Secure Database Outsourcing
暂无分享,去创建一个
[1] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[2] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[3] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[4] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[7] Oliver Günther,et al. Provable Security for Outsourcing Database Operations , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[8] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[9] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[10] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[11] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[12] Sheng Zhong,et al. Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.
[13] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[14] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[15] Oliver Günther,et al. Trust Is not Enough: Privacy and Security in ASP and Web Service Environments , 2002, ADBIS.