APRON 发表于 2025-3-28 18:11:32

http://reply.papertrans.cn/87/8633/863277/863277_41.png

西瓜 发表于 2025-3-28 19:17:01

Query Log Attack on Encrypted Databasesere are more than a dozen mechanisms proposed on how to encrypt data to achieve different levels of confidentiality. However, a database system is more than just data. An inseparable aspect of a database system is its interaction with the users through queries. Yet, a query-enhanced adversary model

直觉没有 发表于 2025-3-29 00:31:50

http://reply.papertrans.cn/87/8633/863277/863277_43.png

AGGER 发表于 2025-3-29 05:47:54

http://reply.papertrans.cn/87/8633/863277/863277_44.png

Supplement 发表于 2025-3-29 09:56:14

Willem Jonker,Milan Petković also per chapter. The exposed results are expected to find applications in many areas of computer science and applied mathematics, such as neural networks, intelligent systems, complexity theory, learning theo978-3-642-26855-7978-3-642-21431-8Series ISSN 1868-4394 Series E-ISSN 1868-4408

BRAWL 发表于 2025-3-29 13:13:14

http://reply.papertrans.cn/87/8633/863277/863277_46.png

wangle 发表于 2025-3-29 17:30:36

http://reply.papertrans.cn/87/8633/863277/863277_47.png

恶意 发表于 2025-3-29 22:58:52

Secure Similar Document Detection with Simhashe that the proposed method improves the computational and communication costs by at least one order of magnitude compared to the current state-of-the-art protocol. Moreover, it achieves a high level of precision and recall.

荧光 发表于 2025-3-30 01:29:47

http://reply.papertrans.cn/87/8633/863277/863277_49.png

锡箔纸 发表于 2025-3-30 08:00:22

http://reply.papertrans.cn/87/8633/863277/863277_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Secure Data Management; 10th VLDB Workshop, Willem Jonker,Milan Petković Conference proceedings 2014 Springer International Publishing Swi