Author:
Sanamrad Tahmineh,Braun Lucas,Kossmann Donald,Venkatesan Ramarathnam
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Agrawal, R., et al.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563–574. ACM (2004)
2. Agrawal, R., et al.: Privacy-preserving data mining. ACM Sigmod Record 29(2), 439–450 (2000)
3. Arasu, A., et al.: Orthogonal Security with Cipherbase. In: CIDR. Citeseer (2013)
4. Bajaj, S., et al.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 205–216. ACM (2011)
5. Berger, B., et al.: Approximation alogorithms for the maximum acyclic subgraph problem. In: Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 236–243. Society for Industrial and Applied Mathematics (1990)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SS4IoT: Secure Search Over Encrypted Outsourced IoT Data;2022 8th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS);2022-12-28
2. Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases;2017 IEEE 33rd International Conference on Data Engineering (ICDE);2017-04
3. The Shadow Nemesis;Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security;2016-10-24
4. Adaptive Indexing over Encrypted Numeric Data;Proceedings of the 2016 International Conference on Management of Data;2016-06-14
5. Talos;Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems;2015-11