Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases
暂无分享,去创建一个
[1] Hannu Toivonen,et al. TANE: An Efficient Algorithm for Discovering Functional and Approximate Dependencies , 1999, Comput. J..
[2] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[3] Rosine Cicchetti,et al. FUN: An Efficient Algorithm for Mining Functional and Embedded Dependencies , 2001, ICDT.
[4] Felix Naumann,et al. Scalable Discovery of Unique Column Combinations , 2013, Proc. VLDB Endow..
[5] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[6] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[7] Florian Kerschbaum,et al. Frequency-Hiding Order-Preserving Encryption , 2015, CCS.
[8] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[9] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[11] Ramarathnam Venkatesan,et al. Randomly Partitioned Encryption for Cloud Databases , 2014, DBSec.
[12] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.
[13] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[14] Paolo Papotti,et al. Scalable data exchange with functional dependencies , 2010, Proc. VLDB Endow..
[15] Mourad Ouzzani,et al. Detecting Inconsistencies in Private Data with Secure Function Evaluation , 2011 .
[16] Fabio Stella,et al. A Privacy Preserving Framework for Accuracy and Completeness Quality Assessment , 2009 .
[17] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[18] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[19] Renée J. Miller,et al. The Use of Information Capacity in Schema Integration and Translation , 1993, VLDB.
[20] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[21] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[22] David Cash,et al. What Else is Revealed by Order-Revealing Encryption? , 2016, IACR Cryptol. ePrint Arch..
[23] H. Mannila,et al. Discovering all most specific sentences , 2003, TODS.
[24] Felix Naumann,et al. Functional Dependency Discovery: An Experimental Evaluation of Seven Algorithms , 2015, Proc. VLDB Endow..
[25] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[26] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[27] Ramarathnam Venkatesan,et al. Orthogonal Security with Cipherbase , 2013, CIDR.
[28] Yannis Rouselakis,et al. Property Preserving Symmetric Encryption , 2012, EUROCRYPT.
[29] Chengfei Liu,et al. Discover Dependencies from Data—A Review , 2012, IEEE Transactions on Knowledge and Data Engineering.
[30] Boxiang Dong,et al. PraDa: Privacy-preserving Data-Deduplication-as-a-Service , 2014, CIKM.
[31] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[32] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[33] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[34] Cory J. Butz,et al. FD/spl I.bar/Mine: discovering functional dependencies in a database using equivalences , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[35] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[36] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[37] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[38] Phokion G. Kolaitis,et al. Semi-Automatic Schema Integration in Clio , 2007, VLDB.
[39] Wenfei Fan,et al. Conditional Functional Dependencies for Data Cleaning , 2007, 2007 IEEE 23rd International Conference on Data Engineering.