1 |
A. Broder and M. Mitzemacher, "Network Applications of Bloom Filters : A Survey," Internet Mathematics Vol.1, No.4, pp 485-509, 2003.
|
2 |
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," IFIP Vol.320, pp 174-187, 2007.
|
3 |
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," In Proc. of the ACM SIGMOD, pp 216-227, 2002,
|
4 |
H. Hacigumus, B. Iyer, and S. Mehrotra, "Efficient execution of aggregation queries over encrypted relational databases," LNCS 2973, pp 125-136, 2004.
|
5 |
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order preserving Encryption for numerical Data," Proc. of the ACM SIGMOD, pp 564-574, 2004.
|
6 |
L. Bouganim, Y. Guo, "Database Encryption," Springer (Ed.),1-9, 2009.
|
7 |
E. Damiani, S. DeCapitani di Vimercati, S. Jajordia, "Balancing confidentiality and efficiency in untrusted relational DBMS," Proc. of the 10th ACM (CCS03), 93-102, 2003.
|