Executing SQL over Encrypted Data in the Database-Service-Provider Model (2002)

by Hakan Hacigümüs , Bala Iyer , Chen Li , Sharad Mehrotra
Citations:291 - 5 self

Active Bibliography

2 Potential Security Holes in Hacıgümüs’ Scheme of Executing SQL over Encrypted Data – Kenny C. K. Fong
1006 Oceanstore: An architecture for global-scale persistent storage – John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Zhao - 2000
674 Models and issues in data stream systems – Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev Motwani, Jennifer Widom - 2002
860 Algorithms for Quantum Computation: Discrete Logarithms and Factoring – Peter W. Shor - 1994
595 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
505 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002