The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Intentional resolution of privacy protection in database systems
Communications of the ACM
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
Achieving data base protection through the use of subkey encryption
Achieving data base protection through the use of subkey encryption
Search Key Substitution in the Encipherment of B-Trees
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Remark on the Threshold RSA Signature Scheme
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Implementation of a Storage Mechanism for Untrusted DBMSs
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Modeling and assessing inference exposure in encrypted databases
ACM Transactions on Information and System Security (TISSEC)
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Masking page reference patterns in encryption databases on untrusted storage
Data & Knowledge Engineering - Special issue: ER 2004
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Cryptographic relational algebra for databases using the field authenticator
Computers & Mathematics with Applications
Security in outsourcing of association rule mining
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A survey on querying encrypted XML documents for databases as a service
ACM SIGMOD Record
Robust t-out-of-n oblivious transfer mechanism based on CRT
Journal of Network and Computer Applications
Privacy-Preserving String Comparisons in Record Linkage Systems: A Review
Information Security Journal: A Global Perspective
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
A file protection system based on a trapdoor one-way hash function
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Fast query over encrypted character data in database
CIS'04 Proceedings of the First international conference on Computational and Information Science
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Designing secure indexes for encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-preserving queries on encrypted data
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
EISA – an enterprise application security solution for databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Research notes: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem
Computer Communications
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata
Journal of Network and Computer Applications
Hi-index | 0.00 |
A new cryptosystem that is suitable for database encryption is presented. The system has the important property of having subkeys that allow the encryption and decryption of fields within a record. The system is based on the Chinese Remainder Theorem.