Search on Encrypted Data
暂无分享,去创建一个
Hakan Hacigümüs | Sharad Mehrotra | Balakrishna R. Iyer | Bijit Hore | S. Mehrotra | B. Iyer | B. Hore | Hakan Hacigümüs | Hakan Hacıgümüş
[1] Donald R. Jones,et al. Solving Partitioning Problems with Genetic Algorithms , 1991, International Conference on Genetic Algorithms.
[2] Murat Kantarcioglu,et al. Sovereign Joins , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[3] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[4] Rajeev Motwani,et al. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.
[5] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[6] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[7] Nalini Venkatasubramanian,et al. Pvault: a client server system providing mobile access to personal data , 2005, StorageSS '05.
[8] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[9] Luc Bouganim,et al. Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.
[10] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[11] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[12] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[13] Jennifer Widom,et al. Database Systems: The Complete Book , 2001 .
[14] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[15] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[16] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[17] Hakan Hacigümüs,et al. Query Optimization in Encrypted Database Systems , 2005, DASFAA.
[18] Surajit Chaudhuri,et al. An overview of query optimization in relational systems , 1998, PODS.
[19] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[20] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[21] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[22] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[23] Gene Tsudik,et al. A Framework for Efficient Storage Security in RDBMS , 2004, EDBT.
[24] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[25] Donald D. Chamberlin,et al. Access Path Selection in a Relational Database Management System , 1989 .
[26] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[27] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[28] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[29] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[30] Patricia G. Selinger,et al. Access path selection in a relational database management system , 1979, SIGMOD '79.
[31] Hakan Hacigümüs,et al. Encrypted Database Integrity in Database Service Provider Model , 2002, Certification and Security in E-Services.
[32] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[33] Josep Domingo. A new privacy homomorphism and applications , 1996 .
[34] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[35] Goetz Graefe,et al. Query evaluation techniques for large databases , 1993, CSUR.