Databases Reference
In-Depth Information
References
1. Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In:
Proc. of International Conference on Data Engineering (ICDE). (2002) 29-40
2. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries.
In: Proc. of Very Large Data Bases (VLDB). (2004) 720-731
3. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of ACM
Management of Data (SIGMOD). (2000) 439-450
4. Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy
preserving data mining. In: Proc. of ACM Symposium on Principles of Database
Systems (PODS). (2003) 211-222
5. Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted
data in the database service provider model. In: Proc. of ACM Management of
Data (SIGMOD). (2002) 216-227
6. Miklau, G., Suciu, D.: Controlling access to published data using cryptography.
In: Proc. of Very Large Data Bases (VLDB). (2003) 898-909
7. Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting
techniques for fine-grained access control. In: Proc. of ACM Management of
Data (SIGMOD). (2004) 551-562
8. Bouganim, L., Ngoc, F.D., Pucheral, P., Wu, L.: Chip-secured data access:
Reconciling access rights with data encryption. In: Proc. of Very Large Data
Bases (VLDB). (2003) 1133-1136
9. Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of
relational query results in data publishing. In: Proc. of ACM Management of
Data (SIGMOD). (2005) 407-418
10. Sion, R.: Query execution assurance for outsourced databases. In: Proc. of Very
Large Data Bases (VLDB). (2005) 601-612
11. Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated
dictionaries and their applications. In: ISC. (2001) 379-393
12. Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data
structures for graph and geometric searching. In: CT-RSA. (2003) 295-313
13. Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data
processing with applications to information security. In: ICALP. (2005) 153-165
14. Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: Enabling
authentication of sliding window queries on streams. In: Proc. of Very Large
Data Bases (VLDB). (2007)
15. Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous authentication
on data streams. In: Proc. of Very Large Data Bases (VLDB). (2007)
16. McCurley, K.: The discrete logarithm problem. In: Proc. of the Symposium in
Applied Mathematics, American Mathematical Society (1990) 49-74
17. National Institute of Standards and Technology: FIPS PUB 180-1: Secure Hash
Standard. National Institute of Standards and Technology (1995)
18. Wang, X., Yin, Y., Yu, H.: Finding collisions in the full sha-1. In: CRYPTO.
(2005)
19. Wang, X., Yao, A., Yao, F.: New collision search for SHA-1 (2005) Presented
at the rump session of Crypto 2005.
20. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure
against adaptive chosen-message attacks. SIAM Journal on Computing 17 (2)
(1988) 96-99
Search WWH ::




Custom Search