Numerical SQL Value Expressions Over Encrypted Cloud Databases
暂无分享,去创建一个
[1] Rebecca N. Wright,et al. Experimental Analysis of Privacy-Preserving Statistics Computation , 2004, Secure Data Management.
[2] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[3] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[4] Sushil Jajodia,et al. Scalable Distributed Virtual Data Structures , 2014 .
[5] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[6] M. David Allen,et al. Making Query Execution Over Encrypted Data Practical , 2014, Secure Cloud Computing.
[7] SHAHZADI FARAH,et al. An experimental study on Performance Evaluation of Asymmetric Encryption Algorithms , 2012 .
[8] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[9] Stanley B. Zdonik,et al. Answering Aggregation Queries in a Secure System Model , 2007, VLDB.
[10] Sushil Jajodia,et al. Secure Cloud Computing , 2014, Springer New York.
[11] Khalil El-Khatib,et al. A Secure Database System using Homomorphic Encryption Schemes , 2011, DBKDA 2011.
[12] Sabrina De Capitani di Vimercati,et al. Selective and Fine-Grained Access to Data in the Cloud , 2014, Secure Cloud Computing.
[13] Angelos D. Keromytis,et al. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution , 2011, Moving Target Defense.
[14] Sushil Jajodia,et al. Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.
[15] Hakan Hacigümüs,et al. Search on Encrypted Data , 2007, Secure Data Management in Decentralized Systems.
[16] Sorin Solomon,et al. Power laws in cities population, financial markets and internet sites (scaling in systems with a variable number of components) , 2000 .