|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1140 occurrences of 654 keywords
|
|
|
Results
Found 5317 publication records. Showing 5317 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
88 | Ian F. Blake, Vladimir Kolesnikov |
Conditional Encrypted Mapping and Comparing Encrypted Numbers. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Two Millionaires with encrypted inputs, private selective payments, conditional encrypted mapping, auctions |
67 | Einar Mykletun, Gene Tsudik |
Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
66 | Tiziano Bianchi, Alessandro Piva, Mauro Barni |
Efficient pointwise and blockwise encrypted operations. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
packed representation of signals, signal processing in the encrypted domain, homomorphic encryption |
62 | Sun S. Chung, Gultekin Özsoyoglu |
Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Mauro Barni |
Processing encrypted signals: a new frontier for multimedia security. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee |
Collect and broadcast news in security. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
cipher text, plaintext, algorithm, encryption, decryption |
60 | Tomas Sander, Adam L. Young, Moti Yung |
Non-Interactive CryptoComputing For NC1. |
FOCS |
1999 |
DBLP DOI BibTeX RDF |
cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation |
59 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
57 | Yasuhiro Ohtaki |
Constructing a Searchable Encrypted Log using Encrypted Inverted Indexes. |
CW |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig |
Intrusion Detection for Encrypted Web Accesses. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Tieyan Li, Yongdong Wu, Huafei Zhu |
An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Alina Oprea, Michael K. Reiter |
On Consistency of Encrypted Files. |
DISC |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu |
Efficient Sharing of Encrypted Data. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
52 | Prasenjit Mitra, Chi-Chun Pan, Peng Liu 0005, Vijayalakshmi Atluri |
Privacy-preserving semantic interoperation and access control of heterogeneous databases. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Common secure index, Paillier’s cryptosystem, search on encrypted data |
51 | Shuhua Wu, Yuefei Zhu |
Efficient Augmented Password-Based Encrypted Key Exchange Protocol. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password, Diffie-Hellman assumptions |
51 | Chunxiang Gu, Yuefei Zhu |
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . |
CISC |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures |
51 | M. Choudary Gorantla, Ashutosh Saxena |
Verifiably Encrypted Signature Scheme Without Random Oracles. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
Bilinear Pairings, Fair Exchange, Random Oracles, Verifiably Encrypted Signature |
47 | Xu An Wang 0001, Xiaoyuan Yang 0002, Qingquan Peng |
On Security Notions for Verifiably Encrypted Signature. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Markus Rückert, Dominique Schröder |
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos Mamoulis |
Secure kNN computation on encrypted databases. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
security, encryption, knn |
47 | Ravi Chandra Jammalamadaka, Sharad Mehrotra |
Querying Encrypted XML Documents. |
IDEAS |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Jianhong Zhang, Wei Zou |
A Robust Verifiably Encrypted Signature Scheme. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Peter L. Reiher, Kevin Eustice, Kai-Min Sung |
Adapting Encrypted Data Streams in Open Architectures. |
Active Middleware Services |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
44 | Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood |
Classifying SSH encrypted traffic with minimum packet header features using genetic programming. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
defense applications, encrypted traffic classification, security, genetic programming, active learning, supervised learning, teaming, packet, problem decomposition |
44 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
Two-Party Computing with Encrypted Data. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation |
41 | Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung |
Secure Multi-party Computation Minimizing Online Rounds. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation |
41 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
41 | Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun |
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature |
41 | Eberhard von Faber, R. Hammelrath, F.-P. Heider |
The Secure Distribution of Digital Contents. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems |
40 | Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin |
On Compression of Data Encrypted with Block Ciphers. |
DCC |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran |
Toward Compression of Encrypted Images and Video Sequences. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Tiziano Bianchi, Alessandro Piva, Mauro Barni |
Discrete cosine transform of encrypted images. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Changyu Dong, Giovanni Russello, Naranker Dulay |
Shared and Searchable Encrypted Data for Untrusted Servers. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen |
Encrypted Shared Data Spaces. |
COORDINATION |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
40 | Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Kannan Ramchandran |
On Compression of Encrypted Video. |
DCC |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jianhong Zhang, Jian Mao |
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Yi Tang 0001 |
Sharing Session Keys in Encrypted Databases. |
ICEBE |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Myungjin Lee, Hyokyung Bahn, Kijoon Chae |
A New Key Management Scheme for Distributed Encrypted Storage Systems. |
ICCSA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi |
Fast Query Over Encrypted Character Data in Database. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu |
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang |
Commutative Encryption and Watermarking in Video Compression. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Ozan Ünay, Taflan Imre Gündem |
A survey on querying encrypted XML documents for databases as a service. |
SIGMOD Rec. |
2008 |
DBLP DOI BibTeX RDF |
database as a service, querying encrypted XML document algorithms, XML, encryption |
36 | Kenji Yasu, Yasuhiko Akahane, Masami Ozaki, Koji Semoto, Ryôichi Sasaki |
Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail. |
I3E |
2005 |
DBLP DOI BibTeX RDF |
encrypted e-mail, check system, security, privacy, network, personal information |
36 | Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu |
Statistical Identification of Encrypted Web Browsing Traffic. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
encrypted web traffic, identification |
36 | Mark Cullen, Leon Pintsov, Brian Romansky |
Reading encrypted postal indicia. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
postal services, encrypted postal indicia reading, postal revenue block, postal fraud, digital printing technologies, revenue block information, robustness, encryption, document image processing, fraud, verification process |
34 | Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy |
34 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
34 | Josep Domingo-Ferrer |
A Provably Secure Additive and Multiplicative Privacy Homomorphism. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Encrypted data processing, Delegation of computing and data, E-gambling, Cryptography, Multilevel security, Privacy homomorphisms |
32 | Liang Chen, Chengmin Gao, Yong Xu |
Non-interactive Evaluation of Encrypted Elementary Functions. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Quan Feng, Fei Su, Anni Cai |
Encrypted Fuzzy Vault Based on Fingerprint. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Vik Tor Goh, Jacob Zimmermann, Mark Looi |
Towards Intrusion Detection for Encrypted Networks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy |
Investigating Encrypted Material. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext |
32 | Rohit Pathak, Satyadhar Joshi |
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Secure Multi-party Computation (SMC), Privacy, Protocol, Information Security |
32 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace |
ReFormat: Automatic Reverse Engineering of Encrypted Messages. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols |
32 | Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson |
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. |
SP |
2008 |
DBLP DOI BibTeX RDF |
network security, traffic analysis, voice over IP |
32 | Hyun-A Park, Dong Hoon Lee 0001, Justin Zhan, Gary Blosser |
Efficient keyword index search over encrypted documents of groups. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Keyword field, dynamic group, conjunctive keyword search |
32 | Hakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra |
Search on Encrypted Data. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 |
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jian-Hong Wang, Jen-Yi Pan, Yi-Chi Cheng |
Session recognition and Bandwidth Guarantee for Encrypted Internet Voice Traffic : Case Study of Skype. |
CIDM |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jianhong Zhang |
A verifiably encrypted signature scheme with strong unforgeability. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
security analysis, proof, verifiably encryption |
32 | Marc Liberatore, Brian Neil Levine |
Inferring the source of encrypted HTTP connections. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
low-latency anonymity, traffic analysis, network forensics |
32 | Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu |
A Key-Recovery System for Long-term Encrypted Documents. |
EDOC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Yan-Cheng Chang, Michael Mitzenmacher |
Privacy Preserving Keyword Searches on Remote Encrypted Data. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Jun Li, Edward Omiecinski |
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
32 | George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine |
Privacy Vulnerabilities in Encrypted HTTP Streams. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Markku-Juhani Olavi Saarinen |
Encrypted Watermarks and Linux Laptop Security. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Steven M. Bellovin, Michael Merritt |
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Qin Liu 0001, Guojun Wang 0001, Jie Wu 0001 |
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Jerry Cheng, Hao Yang 0004, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu |
Design and Implementation of Cross-Domain Cooperative Firewall. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Chuanfeng Lv, Qiangfu Zhao |
Integration of Data Compression and Cryptography: Another Way to Increase the Information Security. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Xuefei Cao |
Design of Secure Watermarking Scheme for Watermarking Protocol. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Hyun-A Park, Bum Han Kim, Dong Hoon Lee 0001, Yon Dohn Chung, Justin Zhan |
Secure Similarity Search. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic |
Simultaneous scalability and security for data-intensive web applications. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yingpeng Sang, Hong Shen 0001, Yasushi Inoguchi, Yasuo Tan, Naixue Xiong |
Secure Data Aggregation in Wireless Sensor Networks: A Survey. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Bin B. Zhu, Yang Yang, Shipeng Li 0001 |
JPEG 2000 syntax-compliant encryption preserving full scalability. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | V. Radha 0001, N. Hemanth Kumar |
EISA - An Enterprise Application Security Solution for Databases. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
30 | Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya |
A scalable encryption method allowing backward compatibility with JPEG2000 images. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu |
Order-Preserving Encryption for Numeric Data. (PDF / PS) |
SIGMOD Conference |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon |
Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kyu B. Doh, Kyeongwha Kim, Ting-C. Poon |
Computer Generated Holographic Image Processing for Information Security. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Tage Stabell-Kulø, Arne Helme, Gianluca Dini |
Detecting Key-Dependencies. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Jong Hwan Park |
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data. |
IEEE Trans. Knowl. Data Eng. |
2011 |
DBLP DOI BibTeX RDF |
Hidden vector encryption, bilinear maps, search on encrypted data, database privacy |
29 | David Lai, Zhongwei Zhang |
Self-Authentication of Encrypted Channels in Service Network Graph. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Self authentication, Encrypted Channels, Service Network Graphs |
29 | Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly |
Secrecy, flagging, and paranoia: adoption criteria in encrypted email. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
encrypted e-mail, extended case method, security, activism |
29 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Key management for multi-user encrypted databases. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
encrypted/indexing databases, hierarchical key derivation schema, selective access |
29 | Jianzhong Huang 0001, Changsheng Xie, Bin Cai |
Research and Implement of an Encrypted File System Used to NAS. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
Encrypted File System, Storage Security, NAS, Stackable File System |
26 | Meena Dilip Singh, P. Radha Krishna 0001, Ashutosh Saxena |
A cryptography based privacy preserving solution to mine cloud data. |
Bangalore Compute Conf. |
2010 |
DBLP DOI BibTeX RDF |
encrypted data, private equality test, cryptography, privacy preserving data mining |
26 | Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser 0001, Mehmet Utku Celik, Aweke N. Lemma |
A secure multidimensional point inclusion protocol. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
point inclusion, signal processing in the encrypted domain, computational geometry, secure multiparty computation, homomorphic encryption |
26 | Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard |
Confidentiality-preserving rank-ordered search. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
encrypted domain search, secure index, ranked retrieval |
26 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
26 | Jörg Platte, Raúl Durán Díaz, Edwin Naroska |
An Operating System Design for the Security Architecture for Microprocessors. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Encrypted Programs, Secure Processors, Secure Operating Systems, Certified Execution |
Displaying result #1 - #100 of 5317 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|