Related references
Note: Only part of the references are listed.Order-preserving encryption using approximate common divisors
James Dyer et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)
An Efficiently Searchable Encrypted Data Structure for Range Queries
Florian Kerschbaum et al.
COMPUTER SECURITY - ESORICS 2019, PT II (2019)
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharite et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts
Yanguo Peng et al.
SCIENCE CHINA-INFORMATION SCIENCES (2017)
Generic Attacks on Secure Outsourced Databases
Georgios Kellaris et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Leakage-Abuse Attacks Against Searchable Encryption
David Cash et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE
Zvika Brakerski et al.
SIAM JOURNAL ON COMPUTING (2014)
Searchable symmetric encryption: Improved definitions and efficient constructions
Reza Curtmola et al.
JOURNAL OF COMPUTER SECURITY (2011)
MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values
Hasan Kadhem et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2010)
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seungmin Lee et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2009)
Database Management as a Service: Challenges and Opportunities
Divyakant Agrawal et al.
ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3 (2009)