共 77 条
[1]
Agrawal R., 2004, ACM SIGMOD INT C MAN, P563
[2]
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI DOI 10.1145/2020408.2020579
[3]
Arge Lars, 2004, P ACM SIGMOD INT C M, P347, DOI DOI 10.1145/1007568
[4]
BECKMANN N, 1990, SIGMOD REC, V19, P322, DOI 10.1145/93605.98741
[5]
BENTLEY JL, 1979, COMPUT SURV, V11, P397, DOI 10.1145/356789.356797
[6]
The Tao of Inference in Privacy-Protected Databases
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2018, 11 (11)
:1715-1728
[7]
Epsolute: Efficiently Querying Databases While Providing Differential Privacy
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:2262-2276
[8]
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2019, 12 (08)
:933-947
[9]
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[10]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482