A privacy-aware query authentication index for encrypted database in cloud
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[3] Erhan Bozdag,et al. An empirical research for CNC technology implementation in manufacturing SMEs , 2007 .
[4] Kitae Shin,et al. An assessment of the level of informatization in the Korea mold industry as a prerequisite for e-collaboration: an exploratory empirical investigation , 2006 .
[5] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[6] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[7] Wei-Shinn Ku,et al. Efficient evaluation of skyline queries in wireless data broadcast environments , 2012, SIGSPATIAL/GIS.
[8] Yin Yang,et al. Authenticated join processing in outsourced databases , 2009, SIGMOD Conference.
[9] Qing Li,et al. Enterprise information system project selection with regard to BOCR , 2008 .
[10] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[11] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[12] Qing Li,et al. Performance evaluation for Industrial Automation System Integration based on enterprise architecture standards and application in Cotton Textile Industry , 2011, 2011 International Conference on System science, Engineering design and Manufacturing informatization.
[13] Lakshman S. Thakur,et al. Advanced manufacturing techniques and information technology adoption in India: A current perspective and some comparisons , 2008 .
[14] Yannis Theodoridis,et al. On the Generation of Spatiotemporal Datasets , 1999 .
[15] TsudikGene,et al. Authentication and integrity in outsourced databases , 2006 .
[16] Hyun-Han Kwon,et al. Evaluation of typhoon‐induced rainfall using nonparametric Monte Carlo simulation and locally weighted polynomial regression , 2011 .
[17] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[18] W. Cleveland,et al. Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[21] Xiaoyong Du,et al. A Secure Multi-dimensional Partition Based Index in DAS , 2008, APWeb.
[22] Lata Ragha,et al. Data Integrity and Confidentiality in Outsourced Database , 2012 .
[23] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[24] Dongxi Liu,et al. Query encrypted databases practically , 2012, CCS '12.
[25] Xiaoyong Du,et al. Bucket‐based authentication for outsourced databases , 2010, Concurr. Comput. Pract. Exp..
[26] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[27] Elisa Bertino,et al. PEAR: a hardware based protocol authentication system , 2010, SPRINGL '10.
[28] Dimitris Sacharidis,et al. K-anonymity in the Presence of External Databases , 2022 .
[29] Changxiu Cao,et al. Locally weighted regression for desulphurisation intelligent decision system modeling , 2004, Simul. Model. Pract. Theory.
[30] Q. Henry Wu,et al. Electric Load Forecasting Based on Locally Weighted Support Vector Regression , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[31] Jian Zhou,et al. Fuzzy Rule-based Integrated System Multi-indicators Economic Performance Evaluation and Decision Making Support Framework , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[32] Gene Tsudik,et al. Signature Bouquets: Immutability for Aggregated/Condensed Signatures , 2004, ESORICS.
[33] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.