1 |
B. LEE, "Comparison and Performance Evaluation of the Database Encryption Schemes", M.S. dissertation, Seoul National University, 2013.
|
2 |
H. Hacigv.mv.s, B. Iyer, Chen Li, and Shrad Mehrotra, "Executing SQL over encrypted data in the database service provider model", In Proc. of the ACM SIGMOD, pp.45-49, 2002.
|
3 |
J. Kim, T. Sahama, S. Kim, "A Performance test of Query Operation on Encrypted Database", LNCS 235, pp 801-810, 2013.
|
4 |
A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics, 1(4): 485-509, 2004.
DOI
|
5 |
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal, "The bloomier filter : an efficient data structure for static support lookup tables", in SODA '04: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (Philadelphia, PA, USA), pp.30-39, Society for Industrial and Applied Mathematics, 2004.
|
6 |
S. Lee, H. Ahn, "An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET", Journal of Convergence Security, vol. 13, no. 4, pp. 47-52, 2013.
|