Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
暂无分享,去创建一个
[1] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[2] M. Lothaire. Algebraic Combinatorics on Words , 2002 .
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[5] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[6] Stanley B. Zdonik,et al. Fast, Secure Encryption for Indexing in a Column-Oriented DBMS , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[7] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[8] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[9] Behrooz Parhami,et al. Computer arithmetic - algorithms and hardware designs , 1999 .
[10] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[11] K. Dajani,et al. Ergodic Theory of Numbers: Entropy , 2002 .
[12] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[13] A. Rényi. Representations for real numbers and their ergodic properties , 1957 .
[14] S. Lakshmivarahan,et al. Probability and Random Processes , 2007 .
[15] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[16] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[17] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[18] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.