Author:
Moghadam Somayeh Sobati,Fayoumi Amjad,Vafadoost Peyman
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference20 articles.
1. Cryptdb: protecting confidentiality with encrypted query processing;Popa,2011
2. Processing analytical queries over encrypted data;Tu;Proc. VLDB Endow. PVLDB,2013
3. W.K. Wong, B. Kao, D.W. Cheung, R. Li, S. Yiu, Secure query processing with data interoperability in a cloud database environment, in: International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014, 2014, pp. 1395–1406.
4. Secure data outsourcing based on threshold secret sharing: Towards a more practical solution;Mohammad Ali Hadavi,2010
5. Dividing secrets to secure data outsourcing;Emekçi;Inform. Sci.,2014
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献