Databases Reference
In-Depth Information
32. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy
and ownership preserving of outsourced medical data. In Proceedings of the
International Conference on Data Engineering , 2005.
33. Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva,
and Moti Yung. The kryptoknight family of light-weight protocols for authen-
tication and key distribution. IEEE/ACM Trans. Netw. , 3(1):31-41, 1995.
34. M. Blaze. A Cryptographic File System for Unix. In Proceedings of the first
ACM Conference on Computer and Communications Security , pages 9-16,
Fairfax, VA, 1993. ACM.
35. B. H. Bloom. Space/time trade-offs in hash coding with allowable errors.
Commun. ACM , 13(7):422-426, 1970.
36. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryp-
tion with keyword search. In Proceedings of Eurocrypt 2004 , pages 506-522.
LNCS 3027, 2004.
37. D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably
encrypted signatures from bilinear maps. In EuroCrypt , 2003.
38. R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching
in encrypted data. In Secure Data Management , 2004.
39. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. In SOSP
'89: Proceedings of the twelfth ACM symposium on Operating systems princi-
ples , pages 1-13, New York, NY, USA, 1989. ACM Press.
40. C. Cachin, S. Micali, and M. Stadler. Computationally private information
retrieval with polylog communication. In Proceedings of EUROCRYPT , 1999.
41. C. Cachin, S. Micali, and M. Stadler. Private Information Retrieval with
Polylogarithmic Communication. In Proceedings of Eurocrypt , pages 402-414.
Springer-Verlag, 1999.
42. Bogdan Carbunar and Radu Sion. Arbitrary-Predicate Joins for Outsourced
Data with Privacy Assurances, 2006. Stony Brook Network Security and Ap-
plied Cryptography Lab Tech Report 2006-07.
43. B. Carminati, E. Ferrari, and E. Bertino. Assuring security properties in third-
party architectures. In Proceedings of International Conference on Data Engi-
neering (ICDE) , 2005.
44. G. Cattaneo, L. Catuogno, A. Del Sorbo, and P. Persiano. The Design and
Implementation of a Transparent Cryptographic Filesystem for UNIX. In Pro-
ceedings of the Annual USENIX Technical Conference, FREENIX Track , pages
245-252, Boston, MA, June 2001.
45. Y. Chang. Single-Database Private Information Retrieval with Logarithmic
Communication. In Proceedings of the 9th Australasian Conference on Infor-
mation Security and Privacy ACISP . Springer-Verlag, 2004.
46. Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on
remote encrypted data. Cryptology ePrint Archive, Report 2004/051, 2004.
http://eprint.iacr.org/ .
47. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information
retrieval. In IEEE Symposium on Foundations of Computer Science , pages
41-50, 1995.
48. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information
retrieval. In Proceedings of FOCS . IEEE Computer Society, 1995.
49. Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private
information retrieval. J. ACM , 45(6):965-981, 1998.
Search WWH ::




Custom Search