共 6 条
[1]
Order Preserving Encryption for Numeric Data. Agrawal R,Kiernan J,Srikant R,et al. Proc of SIGMOD‘04 . 2004
[2]
Description of a New Variable-Length Key,BlockCipher(blowfish),Fast Software Encryption. Schneier B. Proc ofCambridge Security Workshop . 1994
[3]
Anatomy:Simple and Effective Pri-vacy Preservation. Xiao Xiaokui,Tao Yufei. Proc of VLDB’06 . 2006
[4]
Blind Custodians:A DatabaseService Architecture That Supports Privacy Without Encryp-tion. Motro A,,Parisi-Presicce F. Proc of Data and Applications Security XIX:19thAnnual IFIP WG 11.3 Working Conf on Data and Applica-tions Security . 2005
[5]
Executing SQL over En-crypted Data in the Database-Service-Provider Model. Hacigumus H,Iyer B,Li C,et al. Proc of ACMSIGMOD Conf on Management of Data . 2002
[6]
Anti-Tamper Database:Querying Encrypted Database. Ozsoyoglu G,Singer D A,Chung S S. Proc of the 17th AnnualIFIP WG11.3 Working Conf on Database and Application Se-curity . 2003