ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Synthetical Cipher Index Technology and its Cryptogram Query Strategy in Outsourced Databases
2009 International Conference on Computational Intelligence and Software Engineering
◽
10.1109/cise.2009.5364604
◽
2009
◽
Author(s):
Ning Wang
◽
Wei Zhao
◽
Guohua Liu
◽
Chunhong Zhao
Keyword(s):
Outsourced Databases
Download Full-text
Related Documents
Cited By
References
PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases
Proceedings of the 2021 International Conference on Management of Data
◽
10.1145/3448016.3452839
◽
2021
◽
Author(s):
Yin Li
◽
Dhrubajyoti Ghosh
◽
Peeyush Gupta
◽
Sharad Mehrotra
◽
Nisha Panwar
◽
...
Keyword(s):
Outsourced Databases
Download Full-text
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases
Lecture Notes in Computer Science - Data and Applications Security and Privacy XXVII
◽
10.1007/978-3-642-39256-6_12
◽
2013
◽
pp. 179-194
◽
Cited By ~ 3
Author(s):
Attila A. Yavuz
Keyword(s):
Outsourced Databases
Download Full-text
Constructing Private Indexes on Encrypted Data for Outsourced Databases
Future Data and Security Engineering - Lecture Notes in Computer Science
◽
10.1007/978-3-319-12778-1_6
◽
2014
◽
pp. 71-85
Author(s):
Yi Tang
◽
Ji Zhang
◽
Xiaolei Zhang
Keyword(s):
Encrypted Data
◽
Outsourced Databases
Download Full-text
Immutable Authentication and Integrity Schemes for Outsourced Databases
IEEE Transactions on Dependable and Secure Computing
◽
10.1109/tdsc.2016.2530708
◽
2018
◽
Vol 15
(1)
◽
pp. 69-82
◽
Cited By ~ 3
Author(s):
Attila Altay Yavuz
Keyword(s):
Outsourced Databases
Download Full-text
Access control scheme with tracing for outsourced databases
Frontiers of Computer Science
◽
10.1007/s11704-012-1193-0
◽
2012
◽
Vol 6
(6)
◽
pp. 677-685
Author(s):
Xiaoming Wang
◽
Guoxiang Yao
Keyword(s):
Access Control
◽
Control Scheme
◽
Outsourced Databases
Download Full-text
A Spatial Transformation Scheme for Enhancing Privacy and Integrity of Outsourced Databases
Lecture Notes in Electrical Engineering - Future Information Technology
◽
10.1007/978-3-642-55038-6_31
◽
2014
◽
pp. 203-210
Author(s):
Hyeong-Il Kim
◽
Deul-Nyeok Youn
◽
Jae-Woo Chang
Keyword(s):
Spatial Transformation
◽
Outsourced Databases
Download Full-text
Privacy-Preserving Data Mining from Outsourced Databases
Computers, Privacy and Data Protection: an Element of Choice
◽
10.1007/978-94-007-0641-5_19
◽
2011
◽
pp. 411-426
◽
Cited By ~ 7
Author(s):
Fosca Giannotti
◽
Laks V.S. Lakshmanan
◽
Anna Monreale
◽
Dino Pedreschi
◽
Hui (Wendy) Wang
Keyword(s):
Data Mining
◽
Privacy Preserving
◽
Privacy Preserving Data Mining
◽
Outsourced Databases
Download Full-text
Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases
IEEE Transactions on Cloud Computing
◽
10.1109/tcc.2020.2975175
◽
2020
◽
pp. 1-1
Author(s):
Weipeng Lin
◽
Ke Wang
◽
Zhilin Zhang
◽
Ada Wai-Chee Fu
◽
Raymond Chi-Wing Wong
◽
...
Keyword(s):
Conjunction Search
◽
Outsourced Databases
Download Full-text
Efficient and secure exact-match queries in outsourced databases
World Wide Web
◽
10.1007/s11280-013-0270-0
◽
2013
◽
Vol 18
(3)
◽
pp. 567-605
◽
Cited By ~ 1
Author(s):
Clemens Heidinger
◽
Klemens Böhm
◽
Erik Buchmann
◽
Martin Spoo
Keyword(s):
Exact Match
◽
Outsourced Databases
Download Full-text
New order preserving encryption model for outsourced databases in cloud environments
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2014.07.001
◽
2016
◽
Vol 59
◽
pp. 198-207
◽
Cited By ~ 49
Author(s):
Zheli Liu
◽
Xiaofeng Chen
◽
Jun Yang
◽
Chunfu Jia
◽
Ilsun You
Keyword(s):
New Order
◽
Cloud Environments
◽
Outsourced Databases
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close