Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data
暂无分享,去创建一个
[1] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[2] Gerhard Weikum,et al. ACM Transactions on Database Systems , 2005 .
[3] Michael Stonebraker,et al. Predicate migration: optimizing queries with expensive predicates , 1992, SIGMOD Conference.
[4] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[5] Radu Sion,et al. Toward Private Joins on Outsourced Data , 2012, IEEE Transactions on Knowledge and Data Engineering.
[6] John Waldron,et al. GPU Accelerated Cryptography as an OS Service , 2010, Trans. Comput. Sci..
[7] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[10] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[11] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[12] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[13] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[14] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[15] Tsuyoshi Takagi,et al. Efficient Implementation of the eta_T Pairing on GPU , 2011 .
[16] Raghav Kaushik,et al. Oblivious Query Processing , 2013, ICDT.
[17] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[18] Abhijit Das,et al. GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field , 2013, AFRICACRYPT.
[19] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[20] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[21] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[22] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[23] Oliver Günther,et al. Processing Joins with User-Defined Functions , 1994, Grundlagen von Datenbanken.
[24] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[25] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[26] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[27] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[28] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[29] David J. DeWitt,et al. A performance evaluation of four parallel join algorithms in a shared-nothing multiprocessor environment , 1989, SIGMOD '89.