Executing SQL over Encrypted Data in the Database-Service-Provider Model (2002)

Cached

Download Links

by Hakan Hacigumus , Hakan Hacg Um Us , Bala Iyer , Chen Li , Sharad Mehrotra
Citations:203 - 3 self

Documents Related by Co-Citation

151 Providing Database as a Service – Hakan Hacigumus, Bala Iyer, Sharad Mehrotra - 2002
219 Practical Techniques for Searches on Encrypted Data – Dawn Xiaodong Song, David Wagner, Song David, Adrian Perrig - 2000
96 Authentication and Integrity in Outsourced Databases – Einar Mykletun, Maithili Narasimha, Gene Tsudik - 2004
79 Authentic Third-party Data Publication – Premkumar T. Devanbu, Michael Gertz, Chip Martel, Stuart G. Stubblebine - 2000
237 Aggregate and Verifiably Encrypted Signatures from Bilinear Maps – Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham - 2002
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
39 Authenticating Query Results in Edge Computing – Hweehwa Pang, Kian-lee Tan - 2004
78 A Privacy-Preserving Index for Range Queries – Bijit Hore, Sharad Mehrotra, Gene Tsudik - 2004
415 Private Information Retrieval – Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan - 1997
285 Protocols for public key cryptosystems – R Merkle - 1980
503 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
325 A certified digital signature – Ralph C Merkle - 1989
46 Query Execution Assurance for Outsourced Databases – Radu Sion - 2005
50 A General Model for Authenticated Data Structures – Chip Martel, Glen Nuckolls, Prem Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine - 2001
608 Privacy-Preserving Data Mining – Rakesh Agrawal , Ramakrishnan Srikant - 2000
105 Protecting Data Privacy in Private Information Retrieval Schemes – Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
80 P.: Extending query rewriting techniques for fine-grained access control – S Rizvi, A Mendelzon, S Sudarshan, Roy - 2004
190 Hippocratic databases – Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu - 2002
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997