SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security and Privacy 2000, pp. 4455.
  • 2
    Curtmola R, Garay JA, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. CCS 2006, 2006, pp: 7988.
  • 3
    Golle P, Staddon J, Waters BR. Secure conjunctive keyword search over encrypted data. ACNS 2004; 3145.
  • 4
    Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data, ICICS 2005, LNCS 3783, pp. 414426.
  • 5
    Hwang YH, Lee PJ. Public Key encryption with conjunctive keyword search and its extension to a multi-user system, Pairing 2007, LNCS 4575, pp. 222.
  • 6
    Wang C, Cao N, Ren K, Lou W. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems 2012; 23(8):14671479.
  • 7
    Boneh D, Crescenzo GD, Ostrovsky R, Persiano G. Public key encryption with keyword search, EUROCRYPT 2004, LNCS 3027, pp: 506522.
  • 8
    Hacigumus H, Mehrotra S, Iyer B. Providing database as a service. ICDE 2002; 2938.
  • 9
    Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. SIGMOD 2004, pp. 563574.
  • 10
    Hacigumus H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model, SIGMOD 2002, pp. 216227.
  • 11
    Hacigumus H, Iyer B, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases, DASFAA 2004, pp. 633650.
  • 12
    Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data, TCC 2007, pp. 535554.
  • 13
    Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multidimensional range query over encrypted data, in Proc. of IEEE Symposium on Security and Privacy 2007, pp. 350364.
  • 14
    Boldyreva A, Chenette N, Lee Y, O'Neill A. Order-preserving symmetric encryption, EUROCRYPT 2009, LNCS 5479: 224241.
  • 15
    Boldyreva A, Chenette N, O'Neill A. Order-preserving encryption revisited: improved security analysis and alternative solutions, CRYPTO 2011, LNCS 6841, pp. 578595.
  • 16
    Wong WK, Cheung DW, Kao B, Mamoulis N. Secure kNN computation on encrypted databases, SIGMOD 2009, pp. 139152.
  • 17
    Liu K, Giannella C, Kargupta H. An attacker's view of distance preserving maps for privacy preserving data mining. PKDD 2006, LNAI 4213, pp. 297308.
  • 18
    Chen K, Liu L. Privacy preserving data classification with rotation noise. IEEE ICDM 2005, pp. 589592.
  • 19
    Oliveira SRM, Zaiane OR. Achieving privacy preservation when sharing data for clustering. SDM 2004, LNCS 3178, pp. 6782.
  • 20
    Shoup V. NTL: a library for doing number theory. http://shoup.net/ntl/, Version 5.5.2, 2009. 2009.08.14.