Query Processing Performance on Encrypted Databases by Using the REA Algorithm
暂无分享,去创建一个
S. El-Rabaie | Osama S. Faragallah | O. S. Faragallah | Ayman Mousa | Elsayed Nigm | E. Nigm | S. El-Rabaie | Ayman Mousa
[1] Min Wang,et al. Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.
[2] Dongyao Ji,et al. Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..
[3] Hiroyuki Kitagawa,et al. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..
[4] Sushil Jajodia,et al. Metadata Management in Outsourced Encrypted Databases , 2005, Secure Data Management.
[5] Huy Hoang Ngo,et al. Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..
[6] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[7] Yuefei Zhu,et al. New Efficient Searchable Encryption Schemes from Bilinear Pairings , 2010, Int. J. Netw. Secur..
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Sushil Jajodia,et al. Implementation of a Storage Mechanism for Untrusted DBMSs , 2003, Second IEEE International Security in Storage Workshop.
[10] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[11] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[12] Mohey M. Hadhoud,et al. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..
[13] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[14] Sehun Kim,et al. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..
[15] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[16] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[17] K. M. S. Soyjaudah,et al. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..