1 |
Z. Wang, J. Dai, W. Wang, and B. Shi, Fast Query Over Encrypted Character Data in Database, Communications in Information and Systems, Vol. 4, No. 4, pp. 289-300, 2004
DOI
|
2 |
UCI, http://archive.ics.uci.edu/ml/index.html
|
3 |
E. Damiani, S. De C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003
|
4 |
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, pp. 44-55, 2000
|
5 |
H. Hacigumus, B. R. Iyer, C. Li, and S.d Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In SIGMOD, 2002
|
6 |
H. Hacigumus, B. R. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In DASFAA, 2004
|
7 |
Yigit. sdbm - substitute dbm. In http://search.cpan.org/src/NWCLARK/perl-5.8.4/ext/SDBM_File/sdbm/
|
8 |
디지털 타입즈, http://www.dt.co.kr/contents.htm?article_no=2006031302019922601028
|
9 |
B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu. A framework for efficient storage security in RDBMS. Lecture Notes in Computer Science, vol. 2992, pp. 147-164, 2004
|
10 |
Wikipedia,http://en.wikipedia.org/wiki/Advanced_Encryption_Standard(169)
|
11 |
H. Hacigumus, B. R. Iyer, and S. Mehrotra. Providing database as a service. In ICDE, 2002
|
12 |
Z. Yang, S. Zhong, and R. N. Wright, Privacy-Preserving Queries on Encrypted Data, Proceedings of the 11th European Symposium On Research In Computer Security, 2006
|
13 |
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD, 2004
|
14 |
R. Mogull, "When and How to Use Database Encryption," Gartner, 6 Feb 2004
|
15 |
G. Ozsoyoglu, D. Singer, and S. Chung. Anti-tamper databases: Querying encrypted databases. In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, 2003
|