VRS-DB: Computation Exploration on Encrypted Database
暂无分享,去创建一个
[1] Kunwar Singh Vaisla,et al. Privacy and Security of User's Sensitive Data: A Viable Analysis , 2017, RICE.
[2] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[3] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[4] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[5] Hongji Yang,et al. Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[6] Alfred Menezes,et al. Handbook Of Applied Cryptography Crc Press , 2015 .
[7] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[8] Lei Li,et al. MongoDB NoSQL Injection Analysis and Detection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[9] Yonggang Wen,et al. StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).
[10] Dharavath Ramesh,et al. Data modelling for discrete time series data using Cassandra and MongoDB , 2016, 2016 3rd International Conference on Recent Advances in Information Technology (RAIT).
[11] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.
[12] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[13] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[14] S. Ramachandram,et al. Multi user searchable encryption schemes using Trusted Proxy for cloud based Relational Databases , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[15] Min Wu,et al. A transparent middleware for encrypting data in MongoDB , 2014, 2014 IEEE Workshop on Electronics, Computer and Applications.
[16] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[17] Xiaodong Lin,et al. Achieving authorized and ranked multi-keyword search over encrypted cloud data , 2015, 2015 IEEE International Conference on Communications (ICC).
[18] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[19] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[20] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.