A multi-authority approach to various predicate encryption types | 0 | 0.34 | 2020 |
HeadPrint: detecting anomalous communications through header-based application fingerprinting | 0 | 0.34 | 2020 |
Two-Client And Multi-Client Functional Encryption For Set Intersection | 0 | 0.34 | 2019 |
Victim-Aware Adaptive Covert Channels | 0 | 0.34 | 2019 |
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. | 2 | 0.49 | 2017 |
Private Sharing of IOCs and Sightings. | 1 | 0.39 | 2016 |
Reliably determining data leakage in the presence of strong attackers. | 0 | 0.34 | 2016 |
Publicly Verifiable Private Aggregation of Time-Series Data | 1 | 0.37 | 2015 |
A Survey of Provably Secure Searchable Encryption | 73 | 2.20 | 2014 |
Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings | 16 | 1.71 | 2014 |
Distributed Searchable Symmetric Encryption | 0 | 0.34 | 2014 |
SOFIR: Securely outsourced Forensic image recognition | 2 | 0.37 | 2014 |
Privacy-Preserving Verification of Clinical Research. | 0 | 0.34 | 2013 |
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler. | 0 | 0.34 | 2013 |
Selective document retrieval from encrypted database | 5 | 0.41 | 2012 |
Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings | 12 | 0.69 | 2012 |
Conjunctive wildcard search over encrypted data | 16 | 0.73 | 2011 |
Public-key encryption with delegated search | 10 | 0.58 | 2011 |
Preface | 0 | 0.34 | 2011 |
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings | 10 | 0.60 | 2011 |
Privacy enhanced access control by means of policy blinding | 1 | 0.36 | 2011 |
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records | 0 | 0.34 | 2010 |
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings | 11 | 0.85 | 2010 |
Searching keywords with wildcards on encrypted data | 26 | 0.87 | 2010 |
Computationally efficient searchable symmetric encryption | 26 | 1.51 | 2010 |
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes | 41 | 1.21 | 2009 |
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings | 10 | 0.70 | 2009 |
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application | 40 | 1.53 | 2009 |
Inter-domain Identity-Based Proxy Re-encryption | 17 | 0.72 | 2008 |
Towards an Information Theoretic Analysis of Searchable Encryption | 2 | 0.65 | 2008 |
Efficient key management for cryptographically enforced access control | 8 | 0.56 | 2008 |
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings | 15 | 0.93 | 2008 |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare | 13 | 0.60 | 2008 |
A Key Management Method for Cryptographically Enforced Access Control | 1 | 0.35 | 2007 |
The interval revocation scheme for broadcasting messages to stateless receivers | 0 | 0.34 | 2007 |
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings | 14 | 0.96 | 2007 |
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings | 12 | 0.87 | 2006 |
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems | 0 | 0.34 | 2006 |
Using Element Clustering to Increase the Efficiency of XML Schema Matching | 10 | 0.54 | 2006 |
Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings | 16 | 1.52 | 2005 |
Experiments with queries over encrypted data using secret sharing | 1 | 0.37 | 2005 |
Formalizing the XML schema matching problem as a constraint optimization problem | 14 | 0.65 | 2005 |
Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings | 15 | 1.51 | 2004 |
Efficient Tree Search in Encrypted Data. | 14 | 0.93 | 2004 |
Privacy-Preserving Digital Rights Management | 11 | 1.40 | 2004 |
Using Secret Sharing for Searching in Encrypted Data | 20 | 1.13 | 2004 |
Integrated use of different content derivation techniques within a multimedia database management system | 3 | 0.42 | 2004 |
Preparations For Encrypted Xml Metadata Querying | 1 | 0.41 | 2004 |
Privacy in an Identity-based DRM System | 20 | 1.99 | 2003 |
Xml And Secure Data Management In An Ambient World | 1 | 0.40 | 2003 |