Cited in
(40)- Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
- Adaptive succinct garbled RAM or: how to delegate your database
- Performance/security tradeoffs for content-based routing supported by Bloom filters
- Enabling compressed encryption for cloud based big data stores
- Improved structured encryption for SQL databases via hybrid indexing
- Practical techniques building on encryption for protecting and managing data in the cloud
- A symmetric cryptographic scheme for data integrity verification in cloud databases
- Low-leakage secure search for Boolean expressions
- Efficient request-based comparable encryption scheme based on sliding window method
- Processing secure, verifiable and efficient SQL over outsourced database
- Encrypted SQL arithmetic functions processing for secure cloud database
- Security and privacy aspects in MapReduce on clouds: a survey
- ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage
- G-Hadoop
- Cassandra
- HBase
- XtremWeb
- INGRES
- Accumulo
- Plutus
- SiRiUS
- GeneRank
- moleculaRnetworks
- P3S
- SNOBOL
- Dynamo
- VisiCalc
- VoltDB
- nGraph-HE
- OpenFHE
- Deterministic Public-Key Encryption Under Continual Leakage
- NuFHE
- RethinkDB
- StealthDB
- ZeroDB
- A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud
- Semi-order preserving encryption
- Mathematics of big data. Spreadsheets, databases, matrices, and graphs. With a foreword by Charles E. Leiserson
- FSSE: forward secure searchable encryption with keyed-block chains
- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load
This page was built for software: CryptDB