Encrypted Database Design: Specialized Approaches
暂无分享,去创建一个
[1] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[2] Dorothy E. Denning. Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.
[3] Catherine A. Meadows,et al. A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data , 1985, 1985 IEEE Symposium on Security and Privacy.
[4] Richard D. Graubart,et al. The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.
[5] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[6] Dorothy E. Denning,et al. Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.
[7] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[8] Yi-Shiung Yeh,et al. Cryptographic Relational Algebra , 1982, 1982 IEEE Symposium on Security and Privacy.
[9] David L. Wells,et al. Modified Architecture for the Sub-Keys Model , 1983, 1983 IEEE Symposium on Security and Privacy.
[10] Dorothy E. Denning,et al. Field Encryption and Authentication , 1983, CRYPTO.
[11] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[12] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[13] M. E. Maron,et al. An evaluation of retrieval effectiveness for a full-text document-retrieval system , 1985, CACM.