Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing
暂无分享,去创建一个
Rui Li | Alex X. Liu | Bezawada Bruhadeshwar | Ann L. Wang | A. Liu | Bruhadeshwar Bezawada | Rui Li
[1] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[2] Chris Clifton,et al. Security Issues in Querying Encrypted Data , 2005, DBSec.
[3] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[4] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[5] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[6] Feifei Li,et al. Authenticated Index Structures for Outsourced Databases , 2008, Handbook of Database Security.
[7] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[10] Jun Li,et al. Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases , 2005, DBSec.
[11] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[12] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[13] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[14] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[16] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[17] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[18] Marshall Copeland,et al. Microsoft Azure , 2015, Apress.
[19] A. Zahariev. Google App Engine , 2009 .
[20] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[21] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[22] Alex X. Liu,et al. Collaborative enforcement of firewall policies in virtual private networks , 2008, PODC '08.
[23] Eugene Ciurana,et al. Google App Engine , 2009 .
[24] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[25] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[26] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[27] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[28] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[29] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[30] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[31] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[32] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[33] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[34] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[35] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[36] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[37] 日経BP社,et al. Amazon Web Services完全ソリューションガイド , 2016 .
[38] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[39] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[40] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[41] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..