Processing private queries over untrusted data cloud through privacy homomorphism
暂无分享,去创建一个
Jianliang Xu | Haibo Hu | Byron Choi | Chushi Ren | Byron Choi | Jianliang Xu | Haibo Hu | C. Ren
[1] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[2] Jianliang Xu,et al. Non-Exposure Location Anonymity , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[3] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] Ling Liu,et al. Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.
[6] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[7] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[8] Kun Liu,et al. An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining , 2006, PKDD.
[9] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[10] E. Brickell,et al. On privacy homomorphisms , 1987 .
[11] Laks V. S. Lakshmanan,et al. Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.
[12] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[13] Scott A. Vanstone,et al. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms , 2001, CRYPTO.
[14] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[15] Minghua Chen,et al. Privacy Preserving Joins , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Michael A. Soderstrand,et al. Residue number system arithmetic: modern applications in digital signal processing , 1986 .
[17] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[18] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[19] Yücel Saygin,et al. Disclosure Risks of Distance Preserving Data Transformations , 2008, SSDBM.
[20] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[21] Vipin Kumar,et al. Privacy Preserving Nearest Neighbor Search , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[22] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[23] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[24] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[25] Chris Clifton,et al. Privacy - preserving top-k queries , 2005, 21st International Conference on Data Engineering (ICDE'05).
[26] R. Zunino,et al. Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems , 2008, EURASIP J. Embed. Syst..
[27] Tran Khanh Dang. Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers , 2005, iTrust.
[28] Mikhail J. Atallah,et al. Efficient Privacy-Preserving k-Nearest Neighbor Search , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[29] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[30] Hanan Samet,et al. Distance browsing in spatial databases , 1999, TODS.