Author:
Agrawal Divyakant,El Abbadi Amr,Emekci Fatih,Metwally Ahmed,Wang Shiyuan
Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: SIGMOD Conference (2002), http://citeseer.ist.psu.edu/hacigumus02executing.html
2. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of the 30th Int’l. Conference on Very Large Databases VLDB, pp. 720–731 (2004)
3. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD 2004: Proceedings of the, ACM SIGMOD International Conference on Management of Data, pp. 563–574. ACM Press, New York (2004)
4. Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: CIDR, pp. 186–199 (2005)
5. Lecture Notes in Computer Science;M. Kantarcıoǧlu,2005
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking;2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics);2023-12-17
2. A Scientometric Study of Research Development on Cloud Computing-Based Data Management Technique;Proceedings of Fourth Doctoral Symposium on Computational Intelligence;2023
3. New attacks on secret sharing-based data outsourcing: toward a resistant scheme;The Journal of Supercomputing;2022-04-25
4. Securing textual and image data on cloud using searchable encryption;International Journal of Information Technology;2021-01-03
5. Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud;International Journal of Digital Crime and Forensics;2018-01