1 |
E.J. Goh, "Secure Indexes," Technical Report 2003/216, IACR ePrint Crpytography Archive, June 2003.
|
2 |
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference, June 2004.
|
3 |
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt 2004, May 2004.
|
4 |
J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions," EUROCRYPT 2008, LNCS 4965, pp. 146-162, 2008.
|
5 |
Gulteckin Ozsoyoglu, David Singer, "Anti-tamper Database: Querying Encrypted Databases," In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.
|
6 |
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order Preserving Encryption for Numeric Data," In Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France June 2004.
|
7 |
H. Hacigümü , B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database- service-provider model," ACM SIGMOD, 2002.
|
8 |
E. Damiani, S.D.C.di Vimercati, S. Jajodia, S. Paraboshi and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSS," In Proc. of the 10th ACM Conf. on Computer and Communications Security(CCS), October 2003.
|
9 |
A. Ceselli, E. Damiani, S.D.C.D Vimercati, S. Jajoda, S. Paraboschi and P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Database," ACM Transactions on Information and System Security, Vol.8, No.1, Feb. 2005.
|
10 |
L. Liu, J. Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database," csie, vol. 1, pp.303-307, 2009 WRI World Congress on Computer Science and Information Engineering, 2009.
|
11 |
L. Liu and J. Gai, "A Method Query over Encrypted Data in Database," ICCET, Volume 01, pages 23-27, 2009.
|
12 |
M. Mitzenmacher. "Compressed Bloom Filter," IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp. 604-612 December 2002.
DOI
ScienceOn
|
13 |
D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO 2001, August 2001.
|
14 |
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," IEEE Symp. on Security and Privacy, May 2000.
|
15 |
윤인하, "최근 미국 동부지역의 정전사태와 미국 전력 사업의 문제점", Aisa-Pacific Review, 2003.
|