Computer Science ›› 2013, Vol. 40 ›› Issue (11): 140-142.
Previous Articles Next Articles
CHEN Ping,ZHANG Tao,ZHAO Min,YUAN Zhi-jian and YANG Lan-juan
[1] Ashraf A.Deploying database appliances in the cloud[J].IEEE Data Engineering Bullentin,2009,2(1):13-20 [2] Popa R A,Redfield C M S,Zeldovich N,et al.CryptDB:Protecting Confidentiality with Encrypted Query Processing[C]∥Proceedings of the 23rd ACM Symposium on Operating Systems Principles(SOSP 2011).Cascais,Portugal,October 2011 [3] Boldyreva A,Chenette N,Lee Y,et al.Order preserving sym-metric encryption[C]∥Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Cologne,Germany,April 2009 [4] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥Proceedings of the 18th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Prague,Czech Republic,May 1999 [5] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proceedings of the 21st IEEE Sympo-sium on Security and Privacy.Oakland,CA,May 2000 [6] 王卓昊,王希诚.面向托管的数据库即服务系统及资源优化技术[J].计算机工程与应用,2011,47(27):19-23 |
No related articles found! |
|