Author of the publication

Executing SQL over encrypted data in the database-service-provider model.

, , , and . SIGMOD Conference, page 216-227. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Querying Mobile Objects in Spatio-Temporal Databases., , and . SSTD, volume 2121 of Lecture Notes in Computer Science, page 59-78. Springer, (2001)Record Linkage: A 10-Year Retrospective., , and . DASFAA (1), volume 7825 of Lecture Notes in Computer Science, page 3-12. Springer, (2013)Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services., , , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 111-129. Springer, (2012)Multimedia Analysis and Retrieval System (MARS) Project., , and . Data Processing Clinic, GSLIS Publications, (1996)A reflective middleware architecture for simulation integration., , and . ARM, page 3. ACM, (2009)AquaSCALE - Exploring Resilience of Community Water Infrastructures., , and . Middleware Demos/Posters, page 7-8. ACM, (2019)Stochastic Optimization Approach to Transistor Sizing for CMOS VLSI Circuits., , and . DAC, page 36-40. ACM Press, (1994)On Optimal and Fair Service Allocation in Mobile Cloud Computing., , , and . IEEE Trans. Cloud Comput., 6 (3): 815-828 (2018)On Correctness of Nonserializable Executions., , , , and . J. Comput. Syst. Sci., 56 (1): 68-82 (1998)IoT Notary: Attestable Sensor Data Capture in IoT Environments., , , , , , and . CoRR, (2021)