Verifiable Range Query Processing for Cloud Computing
暂无分享,去创建一个
[1] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[2] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[3] Rui Li,et al. Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing , 2016, IEEE/ACM Transactions on Networking.
[4] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[5] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[6] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[7] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[10] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[11] Judith Kelner,et al. Open Source Cloud Computing Platforms , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[12] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[13] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[14] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[15] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[16] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[17] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Jun Li,et al. Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases , 2005, DBSec.
[19] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[20] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[21] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.