共 50 条
- [32] On Minimizing the Size of Encrypted Databases DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 364 - 372
- [34] SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 648 - 653
- [36] Encrypted Databases: Progresses and Challenges ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 628 - 628
- [37] Experiments with queries over encrypted data using secret sharing SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 33 - 46
- [38] Databases, data access, and data sharing in paleoanthropology: First steps EVOLUTIONARY ANTHROPOLOGY, 2007, 16 (05): : 161 - 163
- [39] Querying Encrypted Graph Databases ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 447 - 451
- [40] Anti-tamper databases: Querying encrypted databases DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 133 - 146